CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Lifecycle Timeline
4Description
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Apache DolphinScheduler. This vulnerability may allow unauthorized actors to access sensitive information, including database credentials. This issue affects Apache DolphinScheduler versions 3.1.*. Users are recommended to upgrade to: * version ≥ 3.2.0 if using 3.1.x As a temporary workaround, users who cannot upgrade immediately may restrict the exposed management endpoints by setting the following environment variable: ``` MANAGEMENT_ENDPOINTS_WEB_EXPOSURE_INCLUDE=health,metrics,prometheus ``` Alternatively, add the following configuration to the application.yaml file: ``` management: endpoints: web: exposure: include: health,metrics,prometheus ``` This issue has been reported as CVE-2023-48796: https://cveprocess.apache.org/cve5/CVE-2023-48796
Analysis
Unauthenticated information disclosure in Apache DolphinScheduler 3.1.x exposes database credentials and sensitive configuration via unsecured management endpoints. Network-accessible attackers can retrieve authentication secrets without authentication (CVSS vector PR:N), directly compromising backend infrastructure. Affects all 3.1.* releases. No public exploit identified at time of analysis. Vendor remediation available in version 3.2.0.
Technical Context
CWE-200 exposure via default-enabled Spring Boot Actuator management endpoints lacking access controls. Unauthenticated HTTP requests to /actuator paths return environment properties containing database connection strings, credentials, and internal configuration. Root cause: overly permissive management.endpoints.web.exposure.include default configuration in 3.1.x branch.
Affected Products
Apache DolphinScheduler 3.1.0 through 3.1.x (all patch levels). Vendor: Apache Software Foundation. CPE: cpe:2.3:a:apache_software_foundation:apache_dolphinscheduler:*:*:*:*:*:*:*:*. No other product lines impacted.
Remediation
Vendor-released patch: upgrade to Apache DolphinScheduler version 3.2.0 or later, which restricts management endpoint exposure by default. Official advisory: https://lists.apache.org/thread/ffrmkcwgr2lcz0f5nnnyswhpn3fytsvo. For environments unable to upgrade immediately, apply temporary mitigation by setting environment variable MANAGEMENT_ENDPOINTS_WEB_EXPOSURE_INCLUDE=health,metrics,prometheus or adding equivalent restriction to application.yaml management.endpoints.web.exposure.include configuration. Mitigation limits exposed endpoints to non-sensitive monitoring functions. Verify configuration change effectiveness by testing /actuator endpoint accessibility post-deployment. Prioritize upgrade over workaround for permanent resolution.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209369
GHSA-3cjc-vhfm-ffp2