CVE-2024-43166

9.8 CRITICAL

📋 TL;DR

Apache DolphinScheduler versions before 3.2.2 have incorrect default permissions that could allow unauthorized access to sensitive functionality or data. This affects all deployments using vulnerable versions of this workflow scheduling platform. Attackers could exploit this to gain elevated privileges or access restricted resources.

💻 Affected Systems

Products:
  • Apache DolphinScheduler
Versions: All versions before 3.2.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability stems from incorrect permission settings in the application itself.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code, access sensitive data, or disrupt workflow scheduling operations.

🟠

Likely Case

Unauthorized access to administrative functions, workflow manipulation, or data exfiltration from the scheduling platform.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to the vulnerable service.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-276 indicates incorrect default permissions, suggesting exploitation may be straightforward once the specific permission issue is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3.1

Vendor Advisory: https://lists.apache.org/thread/8zd69zkkx55qp365xp4tml1xh9og5lhk

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download Apache DolphinScheduler 3.3.1 from official sources. 3. Stop the DolphinScheduler service. 4. Replace installation with new version. 5. Restore configuration if needed. 6. Start the service and verify functionality.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to DolphinScheduler to only trusted IP addresses

iptables -A INPUT -p tcp --dport [DolphinScheduler_port] -s [trusted_ip] -j ACCEPT
iptables -A INPUT -p tcp --dport [DolphinScheduler_port] -j DROP

Application Firewall Rules

all

Implement web application firewall rules to block suspicious access patterns

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate DolphinScheduler from untrusted networks
  • Apply principle of least privilege to service accounts and file permissions

🔍 How to Verify

Check if Vulnerable:

Check the DolphinScheduler version in the web interface or configuration files. Versions before 3.2.2 are vulnerable.

Check Version:

Check the version in the web UI or examine the installation directory for version files

Verify Fix Applied:

After upgrading, verify the version shows 3.3.1 or later in the web interface or via version check command.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to administrative endpoints
  • Unusual permission changes or access patterns

Network Indicators:

  • Unexpected connections to DolphinScheduler ports from unauthorized sources

SIEM Query:

source="dolphinscheduler" AND (event_type="access_denied" OR event_type="permission_change")

🔗 References

📤 Share & Export