This is an automated email from the ASF dual-hosted git repository.

zihaoxiang pushed a commit to branch dev
in repository https://gitbox.apache.org/repos/asf/dolphinscheduler.git


The following commit(s) were added to refs/heads/dev by this push:
     new 008e6e524a [Chore] Add mistaken security vulnerabilities in security 
model (#17120)
008e6e524a is described below

commit 008e6e524afc78aa4b7557d1a0be8ab984745257
Author: Wenjun Ruan <[email protected]>
AuthorDate: Fri Apr 11 13:39:26 2025 +0800

    [Chore] Add mistaken security vulnerabilities in security model (#17120)
---
 docs/docs/en/contribute/join/security-model.md | 4 ++++
 docs/docs/zh/contribute/join/security-model.md | 4 ++++
 2 files changed, 8 insertions(+)

diff --git a/docs/docs/en/contribute/join/security-model.md 
b/docs/docs/en/contribute/join/security-model.md
index 9e4aeb2f07..9d0f1e2faa 100644
--- a/docs/docs/en/contribute/join/security-model.md
+++ b/docs/docs/en/contribute/join/security-model.md
@@ -87,4 +87,8 @@ The following are some erroneous vulnerabilities raised by 
users and developers
    There are multiple input boxes in Apache DolphinScheduler, allowing users 
to customize configurations as needed. As an open source task scheduling 
system, Apache DolphinScheduler requires administrators to fully trust all 
authorized operations of the target user in the process of deployment, 
authorization, and other security-related processes. If the user's behavior of 
adding and modifying configurations through pages or calling interfaces is 
within the scope of permissions, then the  [...]
 5. Attack or other operations by modifying the image or providing an unsafe 
image to run
    Apache DolphinScheduler itself and task operations both support k8s 
clusters. Before the service or task runs, the user needs to ensure the image's 
functions and configured parameters, and trust all operations during the 
service and task running process. Therefore, modifying tasks or parameters by 
any means before the image runs to attack or complete other operations does not 
constitute a security vulnerability.
+6. Attacks by obtaining certain sensitive information printed in service logs
+   Apache DolphinScheduler prints some sensitive information in its service 
logs, which can be used by service deployers to view detailed information about 
the program's operation. Service deployers are considered trusted users, and we 
do not believe that service deployers will attack the program, so this type of 
issue is not a vulnerability.
+7. Security problems caused by system administrators accessing untrusted 
third-party websites
+   System administrators using Apache DolphinScheduler may access untrusted 
third-party websites, resulting in system attacks; such issues are not 
considered security vulnerabilities. System administrators are considered to be 
trusted users, and we believe that system administrators have a basic awareness 
of security precautions. Problems caused by weak security precautions on the 
part of system administrators are not considered vulnerabilities.
 
diff --git a/docs/docs/zh/contribute/join/security-model.md 
b/docs/docs/zh/contribute/join/security-model.md
index c146da0653..2ec25d8041 100644
--- a/docs/docs/zh/contribute/join/security-model.md
+++ b/docs/docs/zh/contribute/join/security-model.md
@@ -85,3 +85,7 @@ Apache DolphinScheduler的部署和使用认为用户网络是安全和值得信
 在Apache DolphinScheduler有多个输入框,允许用户按需进行自定义配置,Apache 
DolphinScheduler作为开源任务调度系统,管理员用户在部署、授权等涉及安全的过程中需要完全信任目标用户的所有授权范围内的操作,用户通过页面或调用接口增加、修改配置的行为如果属于权限范围内的操作,则通过该方式进行攻击或其他操作的行为不属于安全漏洞。
 5.通过修改镜像或提供不安全的镜像运行进行攻击或其他操作
 Apache 
DolphinScheduler的本身和任务运行均支持k8s集群,在服务或任务运行之前,用户需要确保镜像的功能和所配置参数,信任服务、任务运行过程中的所有操作。所以在镜像运行之前通过任何途径将任务或参数进行修改进行攻击或其他完成其他操作的行为不属于安全漏洞。
+6.通过获取服务日志中打印的某些敏感信息进行攻击
+Apache 
DolphinScheduler的服务日志中会打印部分敏感信息,服务部署人员可以通过日志查看程序运行的详细信息。服务部署人员被认为是可信任的用户,我们认为服务部署人员不会攻击程序,所以该类型问题不属于漏洞。
+7.系统管理员通过访问不受信任的三方网站导致的安全问题
+系统管理员在使用Apache 
DolphinScheduler的过程中,可能会访问不受信任的三方网站,导致系统被攻击,这种问题不属于安全漏洞。系统管理员被认为是可信任的用户,我们认为系统管理员具备基本的安全防范意识,由于系统管理员的安全防范意识薄弱所引发的问题不属于漏洞。

Reply via email to