CVE-2021-27644: SQL injection in Apache DolphinScheduler
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.88455%
CWE
Published
11/3/2021
Updated
2/1/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.dolphinscheduler:dolphinscheduler-server | maven | < 1.3.6 | 1.3.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insufficient input validation when constructing MySQL JDBC connections. Key indicators:
- DataSourceService.buildParameter() processed untrusted inputs without validation (added checkParams() in patch)
- MySQLDataSource methods handled connection parameters with insecure string operations rather than allow-list validation
- Test cases show injection via 'other' parameters was possible
- CWE-89 mapping confirms SQL injection via crafted parameters These functions would appear in stack traces when processing malicious datasource configuration requests containing SQL injection payloads in connection parameters.