Skip to content

Commit 008e6e5

Browse files
authored
[Chore] Add mistaken security vulnerabilities in security model (#17120)
1 parent 66c1d87 commit 008e6e5

File tree

2 files changed

+8
-0
lines changed

2 files changed

+8
-0
lines changed

docs/docs/en/contribute/join/security-model.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -87,4 +87,8 @@ The following are some erroneous vulnerabilities raised by users and developers
8787
There are multiple input boxes in Apache DolphinScheduler, allowing users to customize configurations as needed. As an open source task scheduling system, Apache DolphinScheduler requires administrators to fully trust all authorized operations of the target user in the process of deployment, authorization, and other security-related processes. If the user's behavior of adding and modifying configurations through pages or calling interfaces is within the scope of permissions, then the behavior of attacking or other operations in this way does not belong to security vulnerabilities.
8888
5. Attack or other operations by modifying the image or providing an unsafe image to run
8989
Apache DolphinScheduler itself and task operations both support k8s clusters. Before the service or task runs, the user needs to ensure the image's functions and configured parameters, and trust all operations during the service and task running process. Therefore, modifying tasks or parameters by any means before the image runs to attack or complete other operations does not constitute a security vulnerability.
90+
6. Attacks by obtaining certain sensitive information printed in service logs
91+
Apache DolphinScheduler prints some sensitive information in its service logs, which can be used by service deployers to view detailed information about the program's operation. Service deployers are considered trusted users, and we do not believe that service deployers will attack the program, so this type of issue is not a vulnerability.
92+
7. Security problems caused by system administrators accessing untrusted third-party websites
93+
System administrators using Apache DolphinScheduler may access untrusted third-party websites, resulting in system attacks; such issues are not considered security vulnerabilities. System administrators are considered to be trusted users, and we believe that system administrators have a basic awareness of security precautions. Problems caused by weak security precautions on the part of system administrators are not considered vulnerabilities.
9094

docs/docs/zh/contribute/join/security-model.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -85,3 +85,7 @@ Apache DolphinScheduler的部署和使用认为用户网络是安全和值得信
8585
在Apache DolphinScheduler有多个输入框,允许用户按需进行自定义配置,Apache DolphinScheduler作为开源任务调度系统,管理员用户在部署、授权等涉及安全的过程中需要完全信任目标用户的所有授权范围内的操作,用户通过页面或调用接口增加、修改配置的行为如果属于权限范围内的操作,则通过该方式进行攻击或其他操作的行为不属于安全漏洞。
8686
5.通过修改镜像或提供不安全的镜像运行进行攻击或其他操作
8787
Apache DolphinScheduler的本身和任务运行均支持k8s集群,在服务或任务运行之前,用户需要确保镜像的功能和所配置参数,信任服务、任务运行过程中的所有操作。所以在镜像运行之前通过任何途径将任务或参数进行修改进行攻击或其他完成其他操作的行为不属于安全漏洞。
88+
6.通过获取服务日志中打印的某些敏感信息进行攻击
89+
Apache DolphinScheduler的服务日志中会打印部分敏感信息,服务部署人员可以通过日志查看程序运行的详细信息。服务部署人员被认为是可信任的用户,我们认为服务部署人员不会攻击程序,所以该类型问题不属于漏洞。
90+
7.系统管理员通过访问不受信任的三方网站导致的安全问题
91+
系统管理员在使用Apache DolphinScheduler的过程中,可能会访问不受信任的三方网站,导致系统被攻击,这种问题不属于安全漏洞。系统管理员被认为是可信任的用户,我们认为系统管理员具备基本的安全防范意识,由于系统管理员的安全防范意识薄弱所引发的问题不属于漏洞。

0 commit comments

Comments
 (0)