{"id":66004,"date":"2023-04-24T12:10:33","date_gmt":"2023-04-24T04:10:33","guid":{"rendered":"https:\/\/version-2.com.sg\/?p=65892"},"modified":"2024-09-13T16:31:20","modified_gmt":"2024-09-13T08:31:20","slug":"cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2023\/04\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce\/","title":{"rendered":"CVE-2022-45875: Apache DolphinScheduler vulnerable to Improper Input Validation leads to RCE"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"66004\" class=\"elementor elementor-66004\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4da8c5f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4da8c5f9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;decf9c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-133ba185\" data-id=\"133ba185\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc2da8d post-content elementor-widget elementor-widget-text-editor\" data-id=\"fc2da8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg12ge4000u0jpmabme9x76.png?tr=w-1800,c-at_max\" width=\"565\" height=\"313\" \/><\/p><div class=\"news-detail-inner-content\" data-v-85c4bf60=\"\" data-v-0bbc59dc=\"\"><h1>Introduction<\/h1><p>Improper Input Validation leads to command injection\/RCE in Apache DolphinScheduler has been found and registered as #CVE-2022-45875<\/p><p>The affected version 3.0.1 and prior versions; version 3.1.0 and prior versions.<\/p><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg13qhb001w0jpmcfuqhjfw.png\" \/><\/p><h4>What is Apache DolphinScheduler<\/h4><p>Apache DolphinScheduler is a modern data workflow orchestration platform with a powerful user interface, dedicated to solving complex task dependencies in the data pipeline and providing various types of jobs available out of the box.<\/p><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg14ej020g80jmjeic44q8d.png\" \/><\/p><h3>Build the\u00a0lab<\/h3><p>I&#8217;m using docker on Ubuntu server 20.04<\/p><h4>Install docker<\/h4><ul><li><p><code>apt update<\/code><\/p><\/li><li><p><code>apt install docker &amp;&amp; docker-compose<\/code><\/p><\/li><\/ul><h4>Setup DolphinScheduler<\/h4><ul><li><p><code>DOLPHINSCHEDULER_VERSION=3.0.0<\/code><\/p><\/li><li><p><code>docker run --name dolphinscheduler-standalone-server -p 12345:12345 -p 25333:25333 -d apache\/dolphinscheduler-standalone-server:\"${DOLPHINSCHEDULER_VERSION}\"<\/code><\/p><\/li><\/ul><p>Verify the container is running:<\/p><ul><li><p><code>docker ps -a<\/code><\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg17g1p00460jpm8mjkc59l.png\" \/><\/p><p>Now open the following link in your browser:<\/p><ul><li><p><a href=\"http:\/\/localhost:12345\/dolphinscheduler\/ui\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">http:\/\/localhost:12345\/dolphinscheduler\/ui<\/a><\/p><\/li><li><p>The creds <code>admin:dolphinscheduler123<\/code><\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg18b5520id0jmj0b02h4dc.png\" \/><\/p><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg18zul20iw0jmjd7uz7xwz.png\" \/><\/p><h1>Reproduce the vulnerability<\/h1><p>As we can understand from the advisor and from the static analysis and the patch diffing, the vulnerability existed in the Alert script plugin which is an alert that happens based on specific settings. The alert has multiple types, one of the types is &#8220;script&#8221; where you are telling the software to run the following alert (which will run the script) if those settings happened.<\/p><h3>Create a bash script<\/h3><ul><li><p>First, we need to create a bash script that we will use for the alarm<\/p><\/li><li><p>Access the docker container<\/p><\/li><\/ul><p><code>sudo docker exec -it &lt;container_id&gt; bash<\/code><\/p><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1ap4w20jp0jmj4iwbdov5.png\" \/><\/p><ul><li><p>Go to \/tmp<\/p><\/li><\/ul><p><code>cd \/tmp<\/code><\/p><ul><li><p>Create the bash script, I&#8217;m making the script to create a file just as a way to check if the alarm got triggered or not.<\/p><\/li><\/ul><p><code>echo \"touch \/tmp\/alarm001finished\" &gt; alarm001.sh<\/code><\/p><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1bri820kb0jmj17rgct64.png\" \/><\/p><ul><li><p>Change the permissions of the script so Apache DolphineScheduler can access it.<\/p><p><code>chmod 777 alarm001.sh<\/code><\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1dlsn20lg0jmjb3y40u5n.png\" \/><\/p><h3>Create a tenant<\/h3><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1hq3s009n0jpm1x7xcp3x.png\" \/><\/p><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1i46n009v0jpm7yc512u5.png\" \/><\/p><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1ipz620o20jmjf07od3g6.png\" \/><\/p><ul><li><p>Assign the Tenant to the admin user<\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1jbkb20ob0jmjfcl81c8g.png\" \/><\/p><h3>Create the alarm<\/h3><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1kk7o20p50jmj5v7r2zp6.png\" \/><\/p><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1ld8g20pn0jmj4ij44s5w.png\" \/><\/p><ul><li><p><code>'; echo \"This is a shell injection attack\" &gt; \/tmp\/injection.txt; #<\/code><\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1lklm00bx0jpm5rig8drz.png\" \/><\/p><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1m5o820q20jmjdis7cs42.png\" \/><\/p><h3>Create the project<\/h3><ul><li><p>Under project we can run the process we want that eventually it will trigger the alarm which it&#8217;s vulnerable to command injection.<\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1mynk20qn0jmjhx7q28ni.png\" \/><\/p><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1nb6c20qr0jmj8ldxahrq.png\" \/><\/p><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1nm0r20qz0jmj1xv3eqn5.png\" \/><\/p><h3>Create workflow definition<\/h3><ul><li><p>Click on the project name &#8220;proj_001&#8221;<\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1pa5c00e00jpm32lvdtj0.png\" \/><\/p><ul><li><p>Go to workflow definition<\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1pu4w00ed0jpmg8lgasen.png\" \/><\/p><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1q0ma00ej0jpm9u74du3u.png\" \/><\/p><ul><li><p>Drag and Drop shell<\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1qljk00f30jpmh2veemyx.png\" \/><\/p><ul><li><p>Once you drop it, it will open this<\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1r27220t30jmj77pf5n78.png\" \/><\/p><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1rd0400ff0jpm22e99vw9.png\" \/><\/p><ul><li><p>In the script you can write whatever you like, it&#8217;s what the shell process will do.<\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1rv7e20tg0jmj1i3i2mb9.png\" \/><\/p><ul><li><p>Now confirm<\/p><\/li><li><p>After the confirm, it will look like this, click save<\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1sig600g10jpm3pbmgfx8.png\" \/><\/p><ul><li><p>It will ask you for Workflow basic information<\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1sxd320tx0jmjc8yf64li.png\" \/><\/p><ul><li><p>After you click confirm, it will take you to this<\/p><\/li><li><p>Click that button to make this workflow online<\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1tqqf00gn0jpm8shw7k76.png\" \/><\/p><ul><li><p>You can notice the color changed.<\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1ukjo00h90jpm5r8vc0vl.png\" \/><\/p><ul><li><p>Click on the start button<\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1uvxw00hk0jpmgos7adcp.png\" \/><\/p><ul><li><p>The notification strategy can be all or success which means when or based on what the alarm will be triggered.<\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1vcgo20vl0jmjeyyd6ilm.png\" \/><\/p><ul><li><p>Click confirm, it will take you to the Workflow instance<\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1vtf800ia0jpm7tbf2jc7.png\" \/><\/p><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1w0pa20w40jmj0gtw35zr.png\" \/><\/p><h3>Check docker<\/h3><ul><li><p><code>ls<\/code><\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg1znqx00li0jpm8iwe7mnm.png\" \/><\/p><ul><li><p>You can see &#8220;alarm001finished&#8221; and this is the file created by alarm001.sh script<\/p><\/li><li><p>Also, you can see injection.txt, this is the file created by the command injection.<\/p><\/li><\/ul><h3>Static Analysis<\/h3><p>Let&#8217;s analyze the source code of the alarm script plugin.<\/p><ul><li><p>Download the source code from here<\/p><\/li><\/ul><p><a href=\"https:\/\/github.com\/apache\/dolphinscheduler\/archive\/refs\/tags\/3.0.0.zip\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">https:\/\/github.com\/apache\/dolphinscheduler\/archive\/refs\/tags\/3.0.0.zip<\/a><\/p><ul><li><p>Go to <strong>dolphinscheduler-3.0.0\\dolphinscheduler-alert\\dolphinscheduler-alert-plugins\\dolphinscheduler-alert-script\\src\\main\\java\\org\\apache\\dolphinscheduler\\plugin\\alert\\script\\ScriptSender.java<\/strong><\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg21pl400ms0jpm41gidqkb.png\" \/><\/p><ul><li><p>The class starts with defining some variables<\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg22jfe000n0jmjamr6b3r9.png\" \/><\/p><ul><li><p>This method will get the value of those parameters from ScriptParamsConstants.java<\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg25f24002m0jmjc1hxbhh2.png\" \/><\/p><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg25x6800po0jpmfscf4p1y.png\" \/><\/p><ul><li><p>Here it will do six things<\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg26zvu003g0jmj2sp33n40.png\" \/><\/p><p>1. validate script path in case of injections<\/p><p>2. Check if the file existed in the first place<\/p><p>3. Check that the script is a file<\/p><p>4. We have an array called <code>cmd<\/code> here where the execution of the script happens and the injection as well.<\/p><p>5. We have an if statement checks if there is no error, it will set the alert status to true and the alert message.<\/p><p>6. Finally, if there is any error we the alarm message with the exit code, and the error will be logged as well.<\/p><p>We are interested in point number 4.<\/p><pre><code>String[] cmd = {\"\/bin\/sh\", \"-c\", scriptPath + ALERT_TITLE_OPTION + \"'\" + title + \"'\" + ALERT_CONTENT_OPTION + \"'\" + content + \"'\" + ALERT_USER_PARAMS_OPTION + \"'\" + userParams + \"'\"};\n        int exitCode = ProcessUtils.executeScript(cmd);<\/code><\/pre><p>The injection happens because this constructs a shell command by concatenating the <code>scriptPath<\/code>, <code>title<\/code>, <code>content<\/code>, and <code>userParams<\/code> strings without validating or sanitizing them.<\/p><p>For more understanding let&#8217;s see how the cmd variable value will look like in case of valid data input.<\/p><ul><li><p><code>scriptPath<\/code> = <code>alarm001.sh<\/code><\/p><\/li><li><p><code>ALERT_TITLE_OPTION<\/code> = <code>-t<\/code><\/p><\/li><li><p><code>ALERT_CONTENT_OPTION<\/code> = <code>-c<\/code><\/p><\/li><li><p><code>ALERT_USER_PARAMS_OPTION<\/code> = <code>-p<\/code><\/p><\/li><\/ul><p>The final result:<\/p><p><code>\/bin\/sh -c \/path\/to\/alarm001.sh -t 'title' -c 'content' -p 'paramtest'<\/code><\/p><p>The developers assume that the input will be between <code>' '<\/code> therefore anything between single quotes <code>' '<\/code> can&#8217;t be escaped or injected.<\/p><p>BUT if the attacker has the ability to close the single quotes <code>' '<\/code> first, after that inject a command, it will be treated as a separate command by the <code>\/bin\/sh<\/code><\/p><p>So, with our payload, the final result will look like this:<\/p><p><code>\/bin\/sh -c \/path\/to\/script.sh -t 'title' -c 'content' -p ''; echo \"This is a shell injection attack\" &gt; \/tmp\/injection.txt; #'<\/code><\/p><p><strong>How to test this?<\/strong><\/p><p>Go to your terminal (you can test inside the docker container itself) and try this command<\/p><p><code>\/bin\/sh -c \/path\/to\/script.sh -t 'title' -c 'content' -p '; echo \"This is a shell injection attack\" &gt; \/tmp\/injection.txt; #'<\/code><\/p><p>Nothing will happen, the injection.txt file won&#8217;t be created.<\/p><p>Now try it like this<\/p><p><code>\/bin\/sh -c \/path\/to\/script.sh -t 'title' -c 'content' -p ''; echo \"This is a shell injection attack\" &gt; \/tmp\/injection.txt; #'<\/code><\/p><p>You will find that the injection.txt is created.<\/p><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg2c1yr00t40jpm18xh8br2.png\" \/><\/p><h1>Patch Diffing<\/h1><p>You can check the changes on the vulnerable endpoint <code>ScriptSender.java<\/code> from here:<\/p><p><a href=\"https:\/\/github.com\/apache\/dolphinscheduler\/commit\/1b7000281e28a44d4de3ed60c3c872582e3d7cb3\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">https:\/\/github.com\/apache\/dolphinscheduler\/commit\/1b7000281e28a44d4de3ed60c3c872582e3d7cb3<\/a><\/p><ul><li><p>They added space in the comments<\/p><\/li><li><p>Removed the cmd array from here<\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg2dtkg007e0jmjhry6bskx.png\" \/><\/p><ul><li><p>Here they added three if statements, basically those statements check if the parameter value contains a single quote <code>'<\/code><\/p><p><br \/>if it is, the alarm won&#8217;t be executed therefore we will not move to line 102 and execute the command constructed in the cmd array variable.<\/p><p>also, the code will log the error and set the message to &#8220;shell script illegal user params&#8221; and the userParams value.<\/p><\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg2j8kr00a40jmje29nc6jt.png\" \/><\/p><h4>Is there a bypass for this?<\/h4><p>I don&#8217;t think so, I tried. every time you try to inject anything without escaping the single quotes <code>' '<\/code> it will be treated as a string as we saw before in the Static analysis.<\/p><h1>Mitigation<\/h1><p>Users should upgrade to version 3.0.2 or 3.1.1.<\/p><h1>Final Thoughts<\/h1><p>There is not much to say about this. Command injection is always my favorite vulnerability, this is really easy to reproduce and exploit.<\/p><p>The issue is solutions like this are not always public therefore you will find more use for it when you find such a solution inside the network company during internal pentesting for example.<\/p><p>Also, another restriction here is that you will need to create a malicious alarm, and to do that you need permissions, after that almost any user can exploit this.<\/p><p>I will show you later how to get RCE and gain access, so stay tuned and join vsociety \ud83d\ude0f.<\/p><h1>Resources:<\/h1><ul><li><p><a href=\"https:\/\/github.com\/apache\/dolphinscheduler\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">https:\/\/github.com\/apache\/dolphinscheduler<\/a><\/p><\/li><li><p><a href=\"https:\/\/dolphinscheduler.apache.org\/en-us\/docs\/3.0.0\/guide\/start\/docker\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">https:\/\/dolphinscheduler.apache.org\/en-us\/docs\/3.0.0\/guide\/start\/docker<\/a><\/p><\/li><\/ul><p>#Apache #DolphinScheduler<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8085a61 post-content elementor-widget elementor-widget-shortcode\" data-id=\"8085a61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"39690\" class=\"elementor elementor-39690\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff2a228 elementor-widget elementor-widget-text-editor\" data-id=\"ff2a228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p><b>About VRX<\/b><br><b>VRX&nbsp;<\/b>is a consolidated vulnerability management platform that protects assets in real time. Its rich, integrated features efficiently pinpoint and remediate the largest risks to your cyber infrastructure. Resolve the most pressing threats with efficient automation features and precise contextual analysis.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Introduction Improper Input Validation leads to command [&hellip;]<\/p>","protected":false},"author":148637484,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[476,1075,61],"tags":[477,1076],"class_list":["post-66004","post","type-post","status-publish","format-standard","hentry","category-vrx","category-year2023","category-press-release","tag-vrx","tag-1076"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CVE-2022-45875: Apache DolphinScheduler vulnerable to Improper Input Validation leads to RCE - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.vicarius.io\/blog\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2022-45875: Apache DolphinScheduler vulnerable to Improper Input Validation leads to RCE - Version 2\" \/>\n<meta property=\"og:description\" content=\"Introduction Improper Input Validation leads to command [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.vicarius.io\/blog\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-24T04:10:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-13T08:31:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg12ge4000u0jpmabme9x76.png?tr=w-1800,c-at_max\" \/>\n<meta name=\"author\" content=\"versionpan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"versionpan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.vicarius.io\\\/blog\\\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/04\\\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce\\\/\"},\"author\":{\"name\":\"versionpan\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\"},\"headline\":\"CVE-2022-45875: Apache DolphinScheduler vulnerable to Improper Input Validation leads to RCE\",\"datePublished\":\"2023-04-24T04:10:33+00:00\",\"dateModified\":\"2024-09-13T08:31:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/04\\\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce\\\/\"},\"wordCount\":1014,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.vicarius.io\\\/blog\\\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ik.imagekit.io\\\/14sfaswy6hrz\\\/blog-posts\\\/images\\\/clgg12ge4000u0jpmabme9x76.png?tr=w-1800,c-at_max\",\"keywords\":[\"vRx\",\"2023\"],\"articleSection\":[\"vRx\",\"2023\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.vicarius.io\\\/blog\\\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/04\\\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce\\\/\",\"url\":\"https:\\\/\\\/www.vicarius.io\\\/blog\\\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce\",\"name\":\"CVE-2022-45875: Apache DolphinScheduler vulnerable to Improper Input Validation leads to RCE - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.vicarius.io\\\/blog\\\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.vicarius.io\\\/blog\\\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ik.imagekit.io\\\/14sfaswy6hrz\\\/blog-posts\\\/images\\\/clgg12ge4000u0jpmabme9x76.png?tr=w-1800,c-at_max\",\"datePublished\":\"2023-04-24T04:10:33+00:00\",\"dateModified\":\"2024-09-13T08:31:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.vicarius.io\\\/blog\\\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.vicarius.io\\\/blog\\\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.vicarius.io\\\/blog\\\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce#primaryimage\",\"url\":\"https:\\\/\\\/ik.imagekit.io\\\/14sfaswy6hrz\\\/blog-posts\\\/images\\\/clgg12ge4000u0jpmabme9x76.png?tr=w-1800,c-at_max\",\"contentUrl\":\"https:\\\/\\\/ik.imagekit.io\\\/14sfaswy6hrz\\\/blog-posts\\\/images\\\/clgg12ge4000u0jpmabme9x76.png?tr=w-1800,c-at_max\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.vicarius.io\\\/blog\\\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVE-2022-45875: Apache DolphinScheduler vulnerable to Improper Input Validation leads to RCE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\",\"name\":\"versionpan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"caption\":\"versionpan\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/versionpan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVE-2022-45875: Apache DolphinScheduler vulnerable to Improper Input Validation leads to RCE - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.vicarius.io\/blog\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce","og_locale":"en_US","og_type":"article","og_title":"CVE-2022-45875: Apache DolphinScheduler vulnerable to Improper Input Validation leads to RCE - Version 2","og_description":"Introduction Improper Input Validation leads to command [&hellip;]","og_url":"https:\/\/www.vicarius.io\/blog\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce","og_site_name":"Version 2","article_published_time":"2023-04-24T04:10:33+00:00","article_modified_time":"2024-09-13T08:31:20+00:00","og_image":[{"url":"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg12ge4000u0jpmabme9x76.png?tr=w-1800,c-at_max","type":"","width":"","height":""}],"author":"versionpan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"versionpan","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.vicarius.io\/blog\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/04\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce\/"},"author":{"name":"versionpan","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8"},"headline":"CVE-2022-45875: Apache DolphinScheduler vulnerable to Improper Input Validation leads to RCE","datePublished":"2023-04-24T04:10:33+00:00","dateModified":"2024-09-13T08:31:20+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/04\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce\/"},"wordCount":1014,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.vicarius.io\/blog\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce#primaryimage"},"thumbnailUrl":"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg12ge4000u0jpmabme9x76.png?tr=w-1800,c-at_max","keywords":["vRx","2023"],"articleSection":["vRx","2023","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.vicarius.io\/blog\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/04\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce\/","url":"https:\/\/www.vicarius.io\/blog\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce","name":"CVE-2022-45875: Apache DolphinScheduler vulnerable to Improper Input Validation leads to RCE - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.vicarius.io\/blog\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce#primaryimage"},"image":{"@id":"https:\/\/www.vicarius.io\/blog\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce#primaryimage"},"thumbnailUrl":"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg12ge4000u0jpmabme9x76.png?tr=w-1800,c-at_max","datePublished":"2023-04-24T04:10:33+00:00","dateModified":"2024-09-13T08:31:20+00:00","breadcrumb":{"@id":"https:\/\/www.vicarius.io\/blog\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.vicarius.io\/blog\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.vicarius.io\/blog\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce#primaryimage","url":"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg12ge4000u0jpmabme9x76.png?tr=w-1800,c-at_max","contentUrl":"https:\/\/ik.imagekit.io\/14sfaswy6hrz\/blog-posts\/images\/clgg12ge4000u0jpmabme9x76.png?tr=w-1800,c-at_max"},{"@type":"BreadcrumbList","@id":"https:\/\/www.vicarius.io\/blog\/cve-2022-45875-apache-dolphinscheduler-vulnerable-to-improper-input-validation-leads-to-rce#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"CVE-2022-45875: Apache DolphinScheduler vulnerable to Improper Input Validation leads to RCE"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8","name":"versionpan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","caption":"versionpan"},"url":"https:\/\/version-2.com\/en\/author\/versionpan\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-haA","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/66004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/148637484"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=66004"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/66004\/revisions"}],"predecessor-version":[{"id":69386,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/66004\/revisions\/69386"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=66004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=66004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=66004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}