CVE-2020-17519
Apache Flink directory traversal attack: reading remote files through the REST API
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- August 12, 2020
- Published Date
- January 05, 2021
- Last Updated
- February 13, 2025
- Vendor
- Apache Software Foundation
- Product
- Apache Flink
- Description
- A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master.
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
SSVC Information
- Exploitation
- active
- Automatable
- Yes
- Technical Impact
- partial
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2024-05-23 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-17519.yaml | 2025-04-26 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
GazettEl/CVE-2020-17519
Type: github • Created: 2025-03-02 23:29:26 UTC • Stars: 0
zhangweijie11/CVE-2020-17519
Type: github • Created: 2022-03-08 09:19:27 UTC • Stars: 0
murataydemir/CVE-2020-17519
Type: github • Created: 2021-01-10 01:24:50 UTC • Stars: 8
hoanx4/CVE-2020-17519
Type: github • Created: 2021-01-08 06:50:59 UTC • Stars: 0
QmF0c3UK/CVE-2020-17519
Type: github • Created: 2021-01-06 13:41:24 UTC • Stars: 1
B1anda0/CVE-2020-17519
Type: github • Created: 2021-01-06 02:15:39 UTC • Stars: 48