Improper Certificate Validation Affecting org.apache.dolphinscheduler:dolphinscheduler-common package, versions [,3.2.1)
Threat Intelligence
EPSS
0.05% (17th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGAPACHEDOLPHINSCHEDULER-6265545
- published 23 Feb 2024
- disclosed 20 Feb 2024
- credit Unknown
Introduced: 20 Feb 2024
CVE-2023-49250 Open this link in a new tabHow to fix?
Upgrade org.apache.dolphinscheduler:dolphinscheduler-common
to version 3.2.1 or higher.
Overview
Affected versions of this package are vulnerable to Improper Certificate Validation due to the HttpUtils
class not verifying certificates. An attacker capable of performing a Man-in-the-Middle (MITM) attack on outgoing https connections could impersonate the server.
References
CVSS Scores
version 3.1