Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2020-17518

Severity
7.5HIGH
EPSS
93.8%
top 0.14%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJan 5
Latest updateFeb 9

Description

Apache Flink 1.5.1 introduced a REST handler that allows you to write an uploaded file to an arbitrary location on the local file system, through a maliciously modified HTTP HEADER. The files can be written to any location accessible by Flink 1.5.1. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit a5264a6f41524afe8ceadf1d8ddc8c80f323ebc4 from apache/flink:master.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDapache/flink1.5.11.11.3
Mavenorg.apache.flink:flink-runtime1.5.11.11.3
CVEListV5apache_software_foundation/apache_flinkApache Flink 1.5.1 to 1.11.2

🔴Vulnerability Details

4
GHSA
Upload of file to arbitrary path in Apache Flink2022-02-09
OSV
Upload of file to arbitrary path in Apache Flink2022-02-09
CVEList
Apache Flink directory traversal attack: remote file writing through the REST API2021-01-05
VulnCheck
Apache flink Relative Path Traversal2020

💥Exploits & PoCs

1
Nuclei
Apache Flink 1.5.1 - Local File Inclusion

📋Vendor Advisories

2
Red Hat
apache-flink: directory traversal attack allows remote file writing through the REST API2021-01-05
Apache
Apache flink: CVE-2020-17518