add cve/apache-Flink/2020/yaml/CVE-2020-17519.yaml.

Signed-off-by: kingsundad <ruriliu@buaa.edu.cn>
This commit is contained in:
kingsundad 2023-05-16 04:58:07 +00:00 committed by Gitee
parent 028f548365
commit ac32fc76ec
No known key found for this signature in database
GPG Key ID: 173E9B9CA92EEF8F
1 changed files with 18 additions and 0 deletions

View File

@ -0,0 +1,18 @@
id: CVE-2020-17519
source: https://vulhub.org/#/environments/flink/CVE-2020-17519/
info:
name: Apache Flink是一个开源流处理框架具有强大的流处理和批处理功能。
severity: high
description:
Apache Flink 1.11.0中引入的一个变化在1.11.1和1.11.2中也有发布允许攻击者通过JobManager进程的REST接口读取JobManager本地文件系统中的任何文件。
scope-of-influence:
Apache Flink 1.11.0-1.11.2
reference:
- https://nvd.nist.gov/vuln/detail/cve-2020-17519
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2020-17519
cnvd-id: None
kve-id: None
tags: cve2020, Apache, Flink, Path Traversal