Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.dolphinscheduler/dolphinscheduler-api
  4. ›
  5. CVE-2023-49068

CVE-2023-49068: Exposure of Sensitive Information to an Unauthorized Actor

November 27, 2023 (updated November 28, 2023)

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache DolphinScheduler.This issue affects Apache DolphinScheduler: before 3.2.1.

Users are recommended to upgrade to version 3.2.1, which fixes the issue. At the time of disclosure of this advisory, this version has not yet been released. In the mean time, we recommend you make sure the logs are only available to trusted operators.

References

  • github.com/advisories/GHSA-c6cg-73p3-973h
  • github.com/apache/dolphinscheduler/commit/7308888c703fbe227887d2426273100582096134
  • github.com/apache/dolphinscheduler/pull/15192
  • lists.apache.org/thread/jn6kr6mjdgtfgpxoq9j8q4pkfsq8zmpq
  • nvd.nist.gov/vuln/detail/CVE-2023-49068

Code Behaviors & Features

Detect and mitigate CVE-2023-49068 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.2.1

Fixed versions

  • 3.2.1

Solution

Upgrade to version 3.2.1 or above.

Weakness

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Source file

maven/org.apache.dolphinscheduler/dolphinscheduler-api/CVE-2023-49068.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:55 +0000.