Session Fixation Affecting org.apache.dolphinscheduler:dolphinscheduler-api package, versions [,3.2.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGAPACHEDOLPHINSCHEDULER-6265543
  • published23 Feb 2024
  • disclosed20 Feb 2024
  • creditlujiefsi

Introduced: 20 Feb 2024

CVE-2023-50270  (opens in a new tab)
CWE-384  (opens in a new tab)

How to fix?

Upgrade org.apache.dolphinscheduler:dolphinscheduler-api to version 3.2.1 or higher.

Overview

Affected versions of this package are vulnerable to Session Fixation. An attacker can hijack a user session by exploiting the fact that a session remains valid even after the user's password has been changed.

CVSS Scores

version 3.1