[CVEID]:CVE-2020-11974
[PRODUCT]:Apache DolphinScheduler(Incubating)
[VERSION]:Apache DolphinScheduler(Incubating) 1.2.0 and 1.2.1
[PROBLEMTYPE]:Remote Code execution vulnerability
[REFERENCES]:https://lists.apache.org/thread.html/rcbe4c248ef0c566e99fd19388a6c92aeef88167286546b675e9b1769%40%3Cdev.dolphinscheduler.apache.org%3E
[DESCRIPTION]:it's related with mysql connectorj remote code execution 
vulnerability
when choosing mysql as database, the detail info please refer:
https://securityonline.info/mysql-connectorj-remote-code-execution-vulnerability/
and we have fixed in PR
(https://github.com/apache/incubator-dolphinscheduler/pull/2728)



Best Regards

DolphinScheduler(Incubator) PPMC
Gang Li 李岗

lgcar...@apache.org
 
From: lidong dai
Date: 2020-09-10 16:45
To: announce
CC: Apache Security Team; dev; 伍 雄
Subject: [CVE-2020-11974] Apache DolphinScheduler (incubating) Remote Code 
execution vulnerability
Severity: Important
 
Vendor: The Apache Software Foundation
 
Versions Affected:
DolphinScheduler  1.2.0  1.2.1
 
 
Description:
 
it's related with mysql connectorj remote code execution vulnerability when
choosing mysql as database, the detail info please refer:
https://securityonline.info/mysql-connectorj-remote-code-execution-vulnerability/
and we have fixed in PR (
https://github.com/apache/incubator-dolphinscheduler/pull/2728)
 
 
Mitigation: 1.2.0 and 1.2.1 users should upgrade to >=1.3.1
 
 
Example: An Attacker can execute code remotely in the DolphinScheduler
server through jdbc connect parameters input
{"detectCustomCollations":true,"autoDeserialize":true}
 
Credit:  This issue was discovered by WuXiong of QI’ANXIN YunYing Lab.
 
 
 
Best Regards
---------------
DolphinScheduler(Incubator) PPMC
Lidong Dai
lidong...@apache.org
---------------

Reply via email to