mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-06-20 01:40:20 +00:00
add CVE-2020-17519
This commit is contained in:
parent
6116435ec4
commit
6ce63806b4
BIN
Flink/CVE-2020-17519/CVE-2020-17519.gif
Normal file
BIN
Flink/CVE-2020-17519/CVE-2020-17519.gif
Normal file
Binary file not shown.
After Width: | Height: | Size: 623 KiB |
9
Flink/CVE-2020-17519/README.md
Normal file
9
Flink/CVE-2020-17519/README.md
Normal file
@ -0,0 +1,9 @@
|
||||
# CVE-2020-17519 Apache Flink Path Traversal
|
||||
|
||||
A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master.
|
||||
|
||||
**[FOFA](https://fofa.so/result?q=app%3D%22Apache+Flink%22&qbase64=YXBwPSJBcGFjaGUgRmxpbmsi) query rule**: app="Apache Flink"
|
||||
|
||||
# Demo
|
||||
|
||||

|
Loading…
x
Reference in New Issue
Block a user