Description
On version 3.0.0 through 3.1.1, Apache DolphinScheduler's python gateway suffered from improper authentication: an attacker could use a socket bytes attack without authentication. This issue has been fixed from version 3.1.2 onwards. For users who use version 3.0.0 to 3.1.1, you can turn off the python-gateway function by changing the value `python-gateway.enabled=false` in configuration file `application.yaml`. If you are using the python gateway, please upgrade to version 3.1.2 or above.
Remediation
References
https://lists.apache.org/thread/25g77jqczp3t8cz56hk1p65q7m6c64rf
http://www.openwall.com/lists/oss-security/2023/04/20/10
Related Vulnerabilities
CVE-2023-25753 Vulnerability in maven package org.apache.shenyu:shenyu-common
CVE-2023-37949 Vulnerability in maven package io.jenkins.plugins:macstadium-orka
CVE-2021-21697 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2023-48796 Vulnerability in maven package org.apache.dolphinscheduler:dolphinscheduler-api
CVE-2021-21290 Vulnerability in maven package io.netty:netty-transport-native-epoll