A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master.
- http://packetstormsecurity.com/files/160849/Apache-Flink-1.11.0-Arbitrary-File-Read-Directory-Traversal.html
- https://github.com/0day404/vulnerability-poc
- https://github.com/0ps/pocassistdb
- https://github.com/0x7n6/OSCP
- https://github.com/0xStrygwyr/OSCP-Guide
- https://github.com/0xZipp0/OSCP
- https://github.com/0xsyr0/OSCP
- https://github.com/20142995/Goby
- https://github.com/20142995/nuclei-templates
- https://github.com/20142995/pocsuite3
- https://github.com/5huai/POC-Test
- https://github.com/AMatheusFeitosaM/OSCP-Cheat
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/ArrestX/--POC
- https://github.com/Awrrays/FrameVul
- https://github.com/B1anda0/CVE-2020-17519
- https://github.com/CLincat/vulcat
- https://github.com/EdgeSecurityTeam/Vulnerability
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/EnriqueSanchezdelVillar/NotesHck
- https://github.com/Faizan-Khanx/OSCP
- https://github.com/GazettEl/CVE-2020-17519
- https://github.com/HaleBera/A-NOVEL-CONTAINER-ATTACKS-DATASET-FOR-INTRUSION-DETECTION-Deployments
- https://github.com/HimmelAward/Goby_POC
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Live-Hack-CVE/CVE-2020-1751
- https://github.com/Ly0nt4r/OSCP
- https://github.com/Ma1Dong/Flink_exp
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/MrCl0wnLab/SimplesApachePathTraversal
- https://github.com/NyxAzrael/Goby_POC
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Osyanina/westone-CVE-2020-17519-scanner
- https://github.com/QmF0c3UK/CVE-2020-17519
- https://github.com/ReflectedThanatos/OSCP-cheatsheet
- https://github.com/SantoriuHen/NotesHck
- https://github.com/SenukDias/OSCP_cheat
- https://github.com/SexyBeast233/SecBooks
- https://github.com/SirElmard/ethical_hacking
- https://github.com/StarCrossPortal/scalpel
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/TrojanAZhen/Self_Back
- https://github.com/VishuGahlyan/OSCP
- https://github.com/XiaomingX/awesome-poc-for-red-team
- https://github.com/Z0fhack/Goby_POC
- https://github.com/anonymous364872/Rapier_Tool
- https://github.com/apif-review/APIF_tool_2024
- https://github.com/apit-review-account/apit-tool
- https://github.com/bakery312/Vulhub-Reproduce
- https://github.com/bigblackhat/oFx
- https://github.com/biggerwing/apache-flink-unauthorized-upload-rce-
- https://github.com/cc8700619/poc
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/dev-team-12x/CVE-2020-17519
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/dolevf/apache-flink-directory-traversal.nse
- https://github.com/dudek-marcin/Poc-Exp
- https://github.com/e-hakson/OSCP
- https://github.com/eljosep/OSCP-Guide
- https://github.com/exfilt/CheatSheet
- https://github.com/fazilbaig1/oscp
- https://github.com/g1san/Agents-for-Vulnerable-Dockers-and-related-Benchmarks
- https://github.com/givemefivw/CVE-2020-17519
- https://github.com/hanc00l/some_pocsuite
- https://github.com/hktalent/bug-bounty
- https://github.com/hoanx4/CVE-2020-17519
- https://github.com/huike007/penetration_poc
- https://github.com/huimzjty/vulwiki
- https://github.com/huisetiankong478/penetration_poc
- https://github.com/iltertaha/vulfocus_automater
- https://github.com/imhunterand/ApachSAL
- https://github.com/jemus17/FOCI-Toolkit
- https://github.com/jitmondal1/OSCP
- https://github.com/jweny/pocassistdb
- https://github.com/kgwanjala/oscp-cheatsheet
- https://github.com/killvxk/Awesome-Exploit
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/merlinepedra/nuclei-templates
- https://github.com/merlinepedra25/nuclei-templates
- https://github.com/murataydemir/CVE-2020-17518
- https://github.com/murataydemir/CVE-2020-17519
- https://github.com/nitishbadole/oscp-note-3
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/odaysec/PwnTraverse
- https://github.com/openx-org/BLEN
- https://github.com/oscpname/OSCP_cheat
- https://github.com/p4d0rn/Siren
- https://github.com/parth45/cheatsheet
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/pwnosec/ApachSAL
- https://github.com/qiuluo-oss/Tiger
- https://github.com/radbsie/CVE-2020-17519-Exp
- https://github.com/ranhn/Goby-Poc
- https://github.com/revanmalang/OSCP
- https://github.com/shanyuhe/YesPoc
- https://github.com/shoucheng3/apache__flink_CVE-2020-17519_1-11-2
- https://github.com/sobinge/nuclei-templates
- https://github.com/soosmile/POC
- https://github.com/thebatmanfuture/apacheflink----POC
- https://github.com/trhacknon/CVE-2020-17519
- https://github.com/txuswashere/OSCP
- https://github.com/tzwlhack/Vulnerability
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xhref/OSCP
- https://github.com/xinyisleep/pocscan
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yaunsky/CVE-2020-17519-Apache-Flink
- https://github.com/youcans896768/APIV_Tool
- https://github.com/zhangweijie11/CVE-2020-17519
- https://github.com/zhibx/fscan-Intranet