Apache DolphinScheduler Python gateway auth bypass v3.0-3.1.1
CVE-2023-25601 Published on April 20, 2023

Apache DolphinScheduler 3.0.0 to 3.1.1 python gateway has improper authentication
On version 3.0.0 through 3.1.1, Apache DolphinScheduler's python gateway suffered from improper authentication: an attacker could use a socket bytes attack without authentication. This issue has been fixed from version 3.1.2 onwards. For users who use version 3.0.0 to 3.1.1, you can turn off the python-gateway function by changing the value `python-gateway.enabled=false` in configuration file `application.yaml`. If you are using the python gateway, please upgrade to version 3.1.2 or above.

Vendor Advisory NVD

Weakness Type

What is an authentification Vulnerability?

When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.

CVE-2023-25601 has been classified to as an authentification vulnerability or weakness.


Products Associated with CVE-2023-25601

Want to know whenever a new CVE is published for Apache DolphinScheduler? stack.watch will email you.

 

Affected Versions

Apache Software Foundation Apache DolphinScheduler:

Exploit Probability

EPSS
0.07%
Percentile
20.66%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.