This module exploits an unauthenticated directory traversal vulnerability in Apache Flink versions 1.11.0 <= 1.11.2. The JobManager REST API fails to validate user-supplied log file paths, allowing retrieval of arbitrary files with the privileges of the web server user. This module has been tested successfully on Apache Flink version 1.11.2 on Ubuntu 18.04.4.
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
msf > use auxiliary/scanner/http/apache_flink_jobmanager_traversal
msf auxiliary(apache_flink_jobmanager_traversal) > show actions
...actions...
msf auxiliary(apache_flink_jobmanager_traversal) > set ACTION < action-name >
msf auxiliary(apache_flink_jobmanager_traversal) > show options
...show and set options...
msf auxiliary(apache_flink_jobmanager_traversal) > run
Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.
– Jim O’Gorman | President, Offensive Security