logo

CVE-2020-17519 org.apache.flink:flink-runtime_2.12

Package

Manager: maven
Name: org.apache.flink:flink-runtime_2.12
Vulnerable Version: >=1.11.0 <1.11.3

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.94383 pctl0.99965

Details

Path Traversal in Apache Flink A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master.

Metadata

Created: 2021-01-06T20:01:34Z
Modified: 2024-05-24T13:56:29Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/01/GHSA-395w-qhqr-9fr6/GHSA-395w-qhqr-9fr6.json
CWE IDs: ["CWE-22", "CWE-552"]
Alternative ID: GHSA-395w-qhqr-9fr6
Finding: F123
Auto approve: 1