Rapid7 Vulnerability & Exploit Database

Apache Flink JobManager Traversal

Back to Search

Apache Flink JobManager Traversal

Disclosed
01/05/2021
Created
02/23/2021

Description

This module exploits an unauthenticated directory traversal vulnerability in Apache Flink versions 1.11.0 <= 1.11.2. The JobManager REST API fails to validate user-supplied log file paths, allowing retrieval of arbitrary files with the privileges of the web server user. This module has been tested successfully on Apache Flink version 1.11.2 on Ubuntu 18.04.4.

Author(s)

  • 0rich1 - Ant Security FG Lab
  • Hoa Nguyen - Suncsr Team
  • bcoles <bcoles@gmail.com>

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/scanner/http/apache_flink_jobmanager_traversal
msf auxiliary(apache_flink_jobmanager_traversal) > show actions
    ...actions...
msf auxiliary(apache_flink_jobmanager_traversal) > set ACTION < action-name >
msf auxiliary(apache_flink_jobmanager_traversal) > show options
    ...show and set options...
msf auxiliary(apache_flink_jobmanager_traversal) > run 

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;