CVE CVE

CVE-2020-17519

CISA Known Exploited Vulnerability (KEV)

Apache Flink Improper Access Control Vulnerability

May 23, 2024

June 13, 2024

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Description

A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master.

References

Weakness Enumeration

CWE-ID CWE Name

CWE-552
Files or Directories Accessible to External Parties

Known Affected Software Configurations


cpe:2.3:a:apache:flink:1.11.2:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.11.2:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.11.1:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.11.1:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.11.0:rc4:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.11.0:rc3:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.11.0:rc2:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.11.0:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.11.0:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.10.2:rc2:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.10.2:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.10.2:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.10.1:rc3:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.10.1:rc2:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.10.1:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.10.1:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.10.0:rc3:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.10.0:rc2:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.10.0:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.10.0:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.9.3:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.9.3:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.9.2:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.9.2:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.9.1:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.9.1:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.9.0:rc3:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.9.0:rc2:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.9.0:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.8.3:rc3:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.8.3:rc2:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.8.3:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.8.3:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.8.2:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.8.2:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.8.1:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.8.1:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.8.0:rc5:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.8.0:rc4:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.8.0:rc3:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.8.0:rc2:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.8.0:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.8.0:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.7.2:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.7.2:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.7.1:rc2:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.7.1:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.7.1:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.7.0:rc3:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.7.0:rc2:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.7.0:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.7.0:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.6.4:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.6.4:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.6.3:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.6.3:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.6.2:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.6.2:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.6.1:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.6.1:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.6.0:rc4:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.6.0:rc3:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.6.0:rc2:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.6.0:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.6.0:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.6:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.6:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.5:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.5:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.4:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.4:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.3:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.3:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.2:rc2:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.2:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.2:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.1:rc3:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.1:rc2:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.1:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.1:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.0:rc6:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.0:rc5:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.0:rc4:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.0:rc3:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.0:rc2:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.0:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.5.0:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.4.2:rc2:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.4.2:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.4.2:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.4.1:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.4.1:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.4.0:rc3:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.4.0:rc2:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.4.0:rc1:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.4.0:-:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.3.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.3.2:rc3:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.3.2:rc2:*:*:*:*:*:*

cpe:2.3:a:apache:flink:1.3.2:rc1:*:*:*:*:*:*

Details

Source:
NVD
Published:
Updated:

Risk information

CVSS v3

Base score:
7.5
Severity:

HIGH

Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v2

Base score:
5
Severity:

MEDIUM

Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N