CVE-2020-17519 Scanner
CVE-2020-17519 scanner - Directory Traversal vulnerability in Apache Software Foundation Apache Flink
Short Info
Level
High
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
30 seconds
Time Interval
4 weeks
Scan only one
URL
Toolbox
-
Apache Flink is a distributed computing software that is used for real-time stream processing and batch processing. It was developed by the Apache Software Foundation and is written in Java, Scala, and Python. Flink is capable of processing vast amounts of data in real-time and is used by various organizations for data analysis, machine learning, and data mining.
CVE-2020-17519 is a vulnerability that was detected in Apache Flink 1.11.0, 1.11.1, and 1.11.2. The vulnerability allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. This access is restricted to files accessible by the JobManager process, but it still can pose a significant security threat.
If this vulnerability is exploited, it can lead to unauthorized access to sensitive information such as login credentials, financial data, and personal information. This vulnerability can also result in the leak of trade secrets and confidential information, leading to a significant loss of revenue and reputation for organizations.
Those who are concerned about the security of their digital assets can benefit from the pro features of the s4e.io platform. By using this platform, users can quickly and easily learn about vulnerabilities in their digital assets, and take necessary steps to protect their data. The platform provides a comprehensive and user-friendly interface for managing security vulnerabilities and securing digital assets.
REFERENCES
- https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d%40%3Cdev.flink.apache.org%3E
- lists.apache.org: [flink-user] 20210105 [CVE-2020-17519] Apache Flink directory traversal attack: reading remote files through the REST API
- lists.apache.org: [flink-dev] 20210105 [CVE-2020-17519] Apache Flink directory traversal attack: reading remote files through the REST API
- lists.apache.org: [announce] 20210105 [CVE-2020-17519] Apache Flink directory traversal attack: reading remote files through the REST API
- openwall.com: [oss-security] 20210105 [CVE-2020-17519] Apache Flink directory traversal attack: reading remote files through the REST API
- lists.apache.org: [flink-issues] 20210106 [GitHub] [flink-web] zentol commented on a change in pull request #408: Add security page for Flink
- http://packetstormsecurity.com/files/160849/Apache-Flink-1.11.0-Arbitrary-File-Read-Directory-Traversal.html
- lists.apache.org: [flink-issues] 20210110 [jira] [Updated] (FLINK-20916) Typo in test for CVE-2020-17519
- lists.apache.org: [flink-dev] 20210110 [jira] [Created] (FLINK-20916) Typo in test for CVE-2020-17519
- lists.apache.org: [flink-issues] 20210110 [jira] [Created] (FLINK-20916) Typo in test for CVE-2020-17519
- lists.apache.org: [flink-issues] 20210111 [jira] [Assigned] (FLINK-20916) Typo in test for CVE-2020-17519
- lists.apache.org: [flink-issues] 20210111 [jira] [Commented] (FLINK-20916) Typo in test for CVE-2020-17519
- lists.apache.org: [flink-dev] 20210113 Re: [DISCUSS] Releasing Apache Flink 1.10.3
- lists.apache.org: [flink-dev] 20210115 Re: [DISCUSS] Releasing Apache Flink 1.10.3
- lists.apache.org: [announce] 20210125 Apache Software Foundation Security Report: 2020
- lists.apache.org: [announce] 20210223 Re: Apache Software Foundation Security Report: 2020
- https://lists.apache.org/thread.html/r26fcdd4fe288323006253437ebc4dd6fdfadfb5e93465a0e4f68420d%40%3Cuser-zh.flink.apache.org%3E