SpringHuBiWei opened a new issue, #16950: URL: https://github.com/apache/dolphinscheduler/issues/16950
### Search before asking - [X] I had searched in the [issues](https://github.com/apache/dolphinscheduler/issues?q=is%3Aissue) and found no similar issues. ### What happened When I visited the website localhost:12345/dolphinscheduler/actuator/heapdump , I found that this address could download a file named "heapdump". Through certain tools, all the account and password information of the data sources could be parsed out. In our view, this situation is very serious. I would like to know if this vulnerability has been fixed in the subsequent versions. Because this interface was detected by our security colleagues, I don't know if there are still similar vulnerabilities in the new version. ### What you expected to happen just a bug ### How to reproduce waiting for fixed ### Anything else _No response_ ### Version 3.1.x ### Are you willing to submit PR? - [X] Yes I am willing to submit a PR! ### Code of Conduct - [X] I agree to follow this project's [Code of Conduct](https://www.apache.org/foundation/policies/conduct) -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: [email protected] For queries about this service, please contact Infrastructure at: [email protected]
