add cve/apache-Flink/2020/yaml/CVE-2020-17519.yaml.
Signed-off-by: kingsundad <ruriliu@buaa.edu.cn>
This commit is contained in:
parent
028f548365
commit
ac32fc76ec
|
@ -0,0 +1,18 @@
|
|||
id: CVE-2020-17519
|
||||
source: https://vulhub.org/#/environments/flink/CVE-2020-17519/
|
||||
info:
|
||||
name: Apache Flink是一个开源流处理框架,具有强大的流处理和批处理功能。
|
||||
severity: high
|
||||
description:
|
||||
Apache Flink 1.11.0中引入的一个变化(在1.11.1和1.11.2中也有发布)允许攻击者通过JobManager进程的REST接口读取JobManager本地文件系统中的任何文件。
|
||||
scope-of-influence:
|
||||
Apache Flink 1.11.0-1.11.2
|
||||
reference:
|
||||
- https://nvd.nist.gov/vuln/detail/cve-2020-17519
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2020-17519
|
||||
cnvd-id: None
|
||||
kve-id: None
|
||||
tags: cve2020, Apache, Flink, Path Traversal
|
Loading…
Reference in New Issue