add cve/apache-Flink/2020/yaml/CVE-2020-17519.yaml.
Signed-off-by: kingsundad <ruriliu@buaa.edu.cn>
This commit is contained in:
parent
028f548365
commit
ac32fc76ec
|
@ -0,0 +1,18 @@
|
||||||
|
id: CVE-2020-17519
|
||||||
|
source: https://vulhub.org/#/environments/flink/CVE-2020-17519/
|
||||||
|
info:
|
||||||
|
name: Apache Flink是一个开源流处理框架,具有强大的流处理和批处理功能。
|
||||||
|
severity: high
|
||||||
|
description:
|
||||||
|
Apache Flink 1.11.0中引入的一个变化(在1.11.1和1.11.2中也有发布)允许攻击者通过JobManager进程的REST接口读取JobManager本地文件系统中的任何文件。
|
||||||
|
scope-of-influence:
|
||||||
|
Apache Flink 1.11.0-1.11.2
|
||||||
|
reference:
|
||||||
|
- https://nvd.nist.gov/vuln/detail/cve-2020-17519
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
cvss-score: 7.5
|
||||||
|
cve-id: CVE-2020-17519
|
||||||
|
cnvd-id: None
|
||||||
|
kve-id: None
|
||||||
|
tags: cve2020, Apache, Flink, Path Traversal
|
Loading…
Reference in New Issue