Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2022-26885 CVE-2022-45462 |
CWE-ID | CWE-256 CWE-78 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
DolphinScheduler Other software / Other software solutions |
Vendor | Apache Foundation |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU69763
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-26885
CWE-ID:
CWE-256 - Unprotected Storage of Credentials
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to other users' credentials.
The vulnerability exists due to application stored credentials in plain text in a configuration file on the system. A local user can obtain access to sensitive information when using tasks to read config files
MitigationInstall updates from vendor's website.
Vulnerable software versionsDolphinScheduler: 2.0.0 alpha - 2.0.5
CPE2.3 External linkshttps://lists.apache.org/thread/z7084r9cs2r26cszkkgjqpb5bhnxqssp
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69762
Risk: Medium
CVSSv4.0: 6.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-45462
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote user to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation within alarm instance management. A remote user can pass specially crafted data to the application and execute arbitrary OS commands on the target system.
Install updates from vendor's website.
Vulnerable software versionsDolphinScheduler: 2.0.0 alpha - 2.0.5
CPE2.3https://lists.apache.org/thread/2f126y32bf1v3mvxkdgt2jr5j3l1t01w
https://www.openwall.com/lists/oss-security/2022/11/23/1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.