CVE-2022-25598

7.5 HIGH

📋 TL;DR

Apache DolphinScheduler's user registration feature contains a Regular Expression Denial of Service (ReDoS) vulnerability that allows attackers to cause service disruption by sending specially crafted input. This affects all Apache DolphinScheduler instances with vulnerable versions that have user registration enabled. The vulnerability can lead to CPU exhaustion and service unavailability.

💻 Affected Systems

Products:
  • Apache DolphinScheduler
Versions: Versions before 2.0.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects instances with user registration functionality enabled. The vulnerability is in the regular expression pattern used for input validation during user registration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service unavailability due to CPU exhaustion, preventing legitimate users from accessing the DolphinScheduler instance and disrupting workflow automation.

🟠

Likely Case

Degraded performance or temporary service disruption affecting user registration and potentially other functions during attack periods.

🟢

If Mitigated

Minimal impact with proper rate limiting, input validation, and monitoring in place to detect and block ReDoS attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

ReDoS attacks typically require minimal technical skill to execute. The vulnerability is in a publicly accessible user registration endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.5 or higher

Vendor Advisory: https://lists.apache.org/thread/hwnw7xr969sg5nv84wz75nfr2c76fl93

Restart Required: Yes

Instructions:

1. Backup your current configuration and data. 2. Download Apache DolphinScheduler version 2.0.5 or higher from the official Apache website. 3. Stop the DolphinScheduler service. 4. Replace the existing installation with the new version. 5. Restart the DolphinScheduler service. 6. Verify the upgrade was successful.

🔧 Temporary Workarounds

Disable User Registration

all

Temporarily disable user registration functionality to prevent exploitation while planning for upgrade.

Modify configuration to disable user registration feature

Implement Rate Limiting

all

Add rate limiting to user registration endpoints to prevent ReDoS attacks.

Configure web server or application firewall to limit requests to user registration endpoints

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for user registration fields
  • Deploy a WAF with ReDoS protection rules and monitor for abnormal request patterns

🔍 How to Verify

Check if Vulnerable:

Check if Apache DolphinScheduler version is below 2.0.5 and user registration is enabled.

Check Version:

Check the DolphinScheduler web interface or configuration files for version information

Verify Fix Applied:

Verify the version is 2.0.5 or higher and test user registration functionality with various inputs.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed user registration attempts with similar patterns
  • Unusually high CPU usage on DolphinScheduler server
  • Slow response times for user registration requests

Network Indicators:

  • High volume of POST requests to user registration endpoints
  • Requests with specially crafted input patterns designed to trigger ReDoS

SIEM Query:

source="dolphinscheduler" AND (message="user registration" OR endpoint="/register") AND status=400 AND count>10 within 1m

🔗 References

📤 Share & Export