CVE-2024-43115

8.8 HIGH

📋 TL;DR

An authenticated user in Apache DolphinScheduler can exploit improper input validation in alert script functionality to execute arbitrary shell commands on the server. This affects all Apache DolphinScheduler installations before version 3.2.2 where alert scripts are enabled.

💻 Affected Systems

Products:
  • Apache DolphinScheduler
Versions: All versions before 3.2.2
Operating Systems: All platforms running DolphinScheduler
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access and alert script functionality to be enabled/accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise leading to data exfiltration, lateral movement, ransomware deployment, or complete system takeover.

🟠

Likely Case

Unauthorized command execution leading to data access, service disruption, or privilege escalation within the DolphinScheduler environment.

🟢

If Mitigated

Limited impact if network segmentation, strict authentication, and least privilege principles are properly implemented.

🌐 Internet-Facing: HIGH - If exposed to the internet, attackers can exploit authenticated access to gain shell execution.
🏢 Internal Only: HIGH - Even internally, authenticated users can escalate privileges to execute arbitrary commands.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but appears straightforward based on vulnerability description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3.1 (or 3.2.2+)

Vendor Advisory: https://lists.apache.org/thread/qm36nrsv1vrr2j4o5q2wo75h3686hrnj

Restart Required: Yes

Instructions:

1. Backup configuration and data. 2. Stop DolphinScheduler service. 3. Upgrade to version 3.3.1 or later. 4. Restart service. 5. Verify functionality.

🔧 Temporary Workarounds

Disable Alert Scripts

all

Temporarily disable alert script functionality to prevent exploitation

Modify alert configuration to remove or disable script execution capabilities

Restrict User Permissions

all

Limit authenticated users' access to alert script features

Review and tighten user role permissions in DolphinScheduler

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate DolphinScheduler from critical systems
  • Enforce least privilege access controls and monitor all authenticated user activities

🔍 How to Verify

Check if Vulnerable:

Check DolphinScheduler version via web interface or configuration files. Versions below 3.2.2 are vulnerable.

Check Version:

Check version in web UI or configuration files. No single command; version is in application properties.

Verify Fix Applied:

Confirm version is 3.3.1 or later and test alert script functionality with safe commands.

📡 Detection & Monitoring

Log Indicators:

  • Unusual shell command execution in alert logs
  • Multiple failed or suspicious alert script attempts
  • Commands from unexpected user accounts

Network Indicators:

  • Unexpected outbound connections from DolphinScheduler server
  • Command and control traffic patterns

SIEM Query:

Search for 'alert script execution' events with suspicious command patterns or from unusual users

🔗 References

📤 Share & Export