org.apache.dolphinscheduler:dolphinscheduler-api@1.3.3 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.dolphinscheduler:dolphinscheduler-api package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Session Fixation

Affected versions of this package are vulnerable to Session Fixation. An attacker can hijack a user session by exploiting the fact that a session remains valid even after the user's password has been changed.

How to fix Session Fixation?

Upgrade org.apache.dolphinscheduler:dolphinscheduler-api to version 3.2.1 or higher.

[,3.2.1)
  • H
Information Exposure

Affected versions of this package are vulnerable to Information Exposure. An attacker can gain unauthorized access to sensitive data by exploiting this vulnerability.

How to fix Information Exposure?

Upgrade org.apache.dolphinscheduler:dolphinscheduler-api to version 3.2.1 or higher.

[,3.2.1)
  • M
Directory Traversal

Affected versions of this package are vulnerable to Directory Traversal due to improper resource validation. Exploiting this vulnerability allows users to add resources to the resource center with a relation path, which will impact only logged-in users.

How to fix Directory Traversal?

Upgrade org.apache.dolphinscheduler:dolphinscheduler-api to version 2.6.0, 3.0.0 or higher.

[,2.6.0) [3.0.0-alpha,3.0.0)
  • M
Improper Authentication

Affected versions of this package are vulnerable to Improper Authentication due to insufficient checks in LdapService.java.

How to fix Improper Authentication?

Upgrade org.apache.dolphinscheduler:dolphinscheduler-api to version 3.1.0 or higher.

[,3.1.0)