⚠ Actively exploited
Added to CISA KEV on 2024-05-23. Federal agencies required to patch by 2024-06-13. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable..
CVE-2020-17519 — Files or Directories Accessible to External Parties in Apache Flink
CWE-552 — Files or Directories Accessible to External PartiesCWE-22 — Path Traversal13 documents12 sources
Severity
7.5HIGHNVD
EPSS
94.3%
top 0.05%
CISA KEV
KEV
Added 2024-05-23
Due 2024-06-13
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedJan 5
KEV addedMay 23
Latest updateMay 30
KEV dueJun 13
CISA Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Description
A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages2 packages
🔴Vulnerability Details
4💥Exploits & PoCs
2Nuclei▶
Apache Flink - Local File Inclusion