Apache DolphinScheduler: Arbitrary File Read Vulnerability
Description
Arbitrary File Read Vulnerability in Apache Dolphinscheduler.
This issue affects Apache DolphinScheduler: before 3.2.1.
We recommend users to upgrade Apache DolphinScheduler to version 3.2.1, which fixes the issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache DolphinScheduler before 3.2.1 has an arbitrary file read vulnerability allowing unauthorized access to sensitive files on the server.
Vulnerability
Overview
CVE-2023-51770 is an arbitrary file read vulnerability in Apache DolphinScheduler, affecting versions 1.2.0 through 3.2.0 (before 3.2.1). The root cause lies in insufficient input validation within the API layer, specifically related to MySQL connection properties as addressed in the fix [4]. This flaw allows an attacker to read arbitrary files from the server's filesystem without proper authorization [1][3].
Exploitation and
Attack Surface
The vulnerability is exploitable via the web API or user interface of DolphinScheduler. An attacker does not require high privileges but must have network access to a vulnerable instance. The attack can be executed by sending crafted requests that manipulate file read operations, bypassing intended access controls. No authentication is strictly necessary, although some exposure may depend on deployment configuration [3]. The open-source project's GitHub page indicates that DolphinScheduler provides a wide range of built-in job types and API endpoints, which expand the attack surface [2].
Impact
Successful exploitation enables an attacker to read sensitive files on the server, including configuration files, credentials, private keys, and other proprietary data. This could lead to further compromise of the DolphinScheduler environment and associated data sources. The severity is rated as important, and the vulnerability has been reported by security researchers [3].
Mitigation
Apache has released version 3.2.1, which fixes the issue by enhancing input validation in the affected API [1][4]. Users are strongly advised to upgrade immediately. There are no known workarounds; upgrading is the only reliable mitigation. The fix is included in the project's main branch and pull request #15433 [4].
- NVD - CVE-2023-51770
- GitHub - apache/dolphinscheduler: Apache DolphinScheduler is the modern data orchestration platform. Agile to create high performance workflow with low-code
- security - CVE-2023-51770: Apache DolphinScheduler: Arbitrary File Read Vulnerability
- [Enhancement][API]Enhance mysql connection properties by lgcareer · Pull Request #15433 · apache/dolphinscheduler
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.dolphinscheduler:dolphinschedulerMaven | < 3.2.1 | 3.2.1 |
Affected products
2- Apache Software Foundation/Apache DolphinSchedulerv5Range: 1.2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/apache/dolphinscheduler/pull/15433ghsapatchWEB
- github.com/advisories/GHSA-ff2w-wm48-jhqjghsaADVISORY
- lists.apache.org/thread/4t8bdjqnfhldh73gy9p0whlgvnnbtn7gghsavendor-advisoryWEB
- lists.apache.org/thread/gpks573kn00ofxn7n9gkg6o47d03p5rwghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2023-51770ghsaADVISORY
- www.openwall.com/lists/oss-security/2024/02/20/2ghsaWEB
News mentions
0No linked articles in our index yet.