Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-17518 PoC — Apache Flink directory traversal attack: remote file writing through the REST API

Source
Associated Vulnerability
Title:Apache Flink directory traversal attack: remote file writing through the REST API (CVE-2020-17518)
Description:Apache Flink 1.5.1 introduced a REST handler that allows you to write an uploaded file to an arbitrary location on the local file system, through a maliciously modified HTTP HEADER. The files can be written to any location accessible by Flink 1.5.1. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit a5264a6f41524afe8ceadf1d8ddc8c80f323ebc4 from apache/flink:master.
File Snapshot

# Apache Flink 小于 1.9.1 远程代码执行 CVE-2020-17518 ## 漏洞描述 Apache Flink 是一个开源流处理框架,具有强大的流处理和批处理能力。 Apa ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →