We found results for “”
CVE-2020-17519
Good to know:
Date: January 5, 2021
A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master.
Language: Java
Severity Score
Related Resources (19)
Severity Score
Weakness Type (CWE)
Files or Directories Accessible to External Parties
CWE-552Top Fix
Upgrade Version
Upgrade to version org.apache.flink:flink-runtime_2.11:release-1.11.3-rc1,org.apache.flink:flink-runtime_2.11:release-1.12.0-rc2,org.apache.flink:flink-runtime_2.12:release-1.11.3-rc1,org.apache.flink:flink-runtime_2.12:release-1.12.0-rc2
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | NONE |
Availability (A): | NONE |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | LOW |
Authentication (AU): | NONE |
Confidentiality (C): | PARTIAL |
Integrity (I): | NONE |
Availability (A): | NONE |
Additional information: |