Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6g88-99wj-8mgg

Опубликовано: 21 мая 2021
Источник: github
Github: Прошло ревью
CVSS3: 4.7

Описание

Command injection in Apache Flink

A vulnerability in Apache Flink where, when running a process with an enabled JMXReporter, with a port configured via metrics.reporter.reporter_name>.port, an attacker with local access to the machine and JMX port can execute a man-in-the-middle attack using a specially crafted request to rebind the JMXRMI registry to one under the attacker's control. This compromises any connection established to the process via JMX, allowing extraction of credentials and any other transferred data.

Пакеты

Наименование

org.apache.flink:flink-core

maven
Затронутые версииВерсия исправления

< 1.9.2

1.9.3

Наименование

org.apache.flink:flink-core

maven
Затронутые версииВерсия исправления

= 1.10.0

1.10.1

EPSS

Процентиль: 26%
0.0009
Низкий

4.7 Medium

CVSS3

Дефекты

CWE-74

Связанные уязвимости

CVSS3: 6.5
redhat
больше 5 лет назад

A vulnerability in Apache Flink (1.1.0 to 1.1.5, 1.2.0 to 1.2.1, 1.3.0 to 1.3.3, 1.4.0 to 1.4.2, 1.5.0 to 1.5.6, 1.6.0 to 1.6.4, 1.7.0 to 1.7.2, 1.8.0 to 1.8.3, 1.9.0 to 1.9.2, 1.10.0) where, when running a process with an enabled JMXReporter, with a port configured via metrics.reporter.reporter_name>.port, an attacker with local access to the machine and JMX port can execute a man-in-the-middle attack using a specially crafted request to rebind the JMXRMI registry to one under the attacker's control. This compromises any connection established to the process via JMX, allowing extraction of credentials and any other transferred data.

CVSS3: 4.7
nvd
больше 5 лет назад

A vulnerability in Apache Flink (1.1.0 to 1.1.5, 1.2.0 to 1.2.1, 1.3.0 to 1.3.3, 1.4.0 to 1.4.2, 1.5.0 to 1.5.6, 1.6.0 to 1.6.4, 1.7.0 to 1.7.2, 1.8.0 to 1.8.3, 1.9.0 to 1.9.2, 1.10.0) where, when running a process with an enabled JMXReporter, with a port configured via metrics.reporter.reporter_name>.port, an attacker with local access to the machine and JMX port can execute a man-in-the-middle attack using a specially crafted request to rebind the JMXRMI registry to one under the attacker's control. This compromises any connection established to the process via JMX, allowing extraction of credentials and any other transferred data.

EPSS

Процентиль: 26%
0.0009
Низкий

4.7 Medium

CVSS3

Дефекты

CWE-74