CVE-2023-49299
📋 TL;DR
This vulnerability allows authenticated users in Apache DolphinScheduler to execute arbitrary JavaScript code on the server without sandbox restrictions. This affects all Apache DolphinScheduler installations running versions before 3.1.9. The issue stems from improper input validation in the application.
💻 Affected Systems
- Apache DolphinScheduler
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise leading to data theft, lateral movement within the network, and potential ransomware deployment.
Likely Case
Unauthorized data access, privilege escalation, and installation of backdoors or cryptocurrency miners.
If Mitigated
Limited impact if proper network segmentation and least privilege access controls are implemented.
🎯 Exploit Status
Exploitation requires authenticated access but the vulnerability is straightforward to exploit once credentials are obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.1.9
Vendor Advisory: https://lists.apache.org/thread/tnf99qoc6tlnwrny4t1zk6mfszgdsokm
Restart Required: Yes
Instructions:
1. Backup your current DolphinScheduler configuration and data. 2. Download version 3.1.9 from the official Apache repository. 3. Stop the DolphinScheduler service. 4. Replace the installation with version 3.1.9. 5. Restart the DolphinScheduler service. 6. Verify the upgrade was successful.
🔧 Temporary Workarounds
Restrict User Access
allLimit DolphinScheduler access to only essential personnel and implement strong authentication controls.
Network Segmentation
allIsolate DolphinScheduler instances from critical systems and implement strict firewall rules.
🧯 If You Can't Patch
- Implement strict network access controls to limit who can reach the DolphinScheduler interface
- Enable detailed logging and monitoring for suspicious JavaScript execution attempts
🔍 How to Verify
Check if Vulnerable:
Check the DolphinScheduler version in the web interface or configuration files. If version is below 3.1.9, the system is vulnerable.
Check Version:
Check the version in the web interface or examine the application.properties file for version information.
Verify Fix Applied:
After upgrading, verify the version shows 3.1.9 or higher in the web interface or configuration.
📡 Detection & Monitoring
Log Indicators:
- Unusual JavaScript execution patterns
- Multiple failed authentication attempts followed by successful login
- Unexpected process creation from DolphinScheduler
Network Indicators:
- Unusual outbound connections from DolphinScheduler server
- Traffic to known malicious domains
SIEM Query:
source="dolphinscheduler" AND (event="javascript_execution" OR event="code_injection")
🔗 References
- http://www.openwall.com/lists/oss-security/2024/02/23/3
- https://github.com/apache/dolphinscheduler/pull/15228
- https://lists.apache.org/thread/tnf99qoc6tlnwrny4t1zk6mfszgdsokm
- http://www.openwall.com/lists/oss-security/2024/02/23/3
- https://github.com/apache/dolphinscheduler/pull/15228
- https://lists.apache.org/thread/tnf99qoc6tlnwrny4t1zk6mfszgdsokm