module

Apache Flink JAR Upload Java Code Execution

Disclosed
2019-11-13
Created
2021-02-23

Description

This module uses job functionality in Apache Flink dashboard web
interface to upload and execute a JAR file, leading to remote
execution of arbitrary Java code as the web server user.

This module has been tested successfully on Apache Flink versions:
1.9.3 on Ubuntu 18.04.4;
1.11.2 on Ubuntu 18.04.4;
1.9.3 on Windows 10; and
1.11.2 on Windows 10.

Authors

Henry Chen
bigger.wing
bcoles bcoles@gmail.com

Platform

Java

Architectures

java

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/multi/http/apache_flink_jar_upload_exec
msf exploit(apache_flink_jar_upload_exec) > show targets
...targets...
msf exploit(apache_flink_jar_upload_exec) > set TARGET < target-id >
msf exploit(apache_flink_jar_upload_exec) > show options
...show and set options...
msf exploit(apache_flink_jar_upload_exec) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.