SpringHuBiWei opened a new issue, #16950:
URL: https://github.com/apache/dolphinscheduler/issues/16950

   ### Search before asking
   
   - [X] I had searched in the 
[issues](https://github.com/apache/dolphinscheduler/issues?q=is%3Aissue) and 
found no similar issues.
   
   
   ### What happened
   
   When I visited the website 
localhost:12345/dolphinscheduler/actuator/heapdump , I found that this address 
could download a file named "heapdump". Through certain tools, all the account 
and password information of the data sources could be parsed out. In our view, 
this situation is very serious. I would like to know if this vulnerability has 
been fixed in the subsequent versions. Because this interface was detected by 
our security colleagues, I don't know if there are still similar 
vulnerabilities in the new version.
   
   ### What you expected to happen
   
   just a bug
   
   ### How to reproduce
   
   waiting for fixed
   
   ### Anything else
   
   _No response_
   
   ### Version
   
   3.1.x
   
   ### Are you willing to submit PR?
   
   - [X] Yes I am willing to submit a PR!
   
   ### Code of Conduct
   
   - [X] I agree to follow this project's [Code of 
Conduct](https://www.apache.org/foundation/policies/conduct)
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: 
[email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to