Apache Flink Upload Path Traversal

By
Anandhu K A
Published on
16 Jun 2021
Vulnerability

Apache Flink is a processing engine that distributes a framework for state calculations across unbounded and bounded data streams developed using Java and Scala. A REST handler introduced in Apache Flink 1.5.1 is vulnerable to unrestricted file upload via directory Travels. Directory traversal is a form of HTTP attack that allows attackers to gain access to password-protected directories. It also runs commands outside of the root directory of the webserver. The access to files is not limited by system operational access control. This vulnerability allows attackers to upload files to the directories in the local filesystem through crafted HTTP requests.

Mitigation / Precaution

We suggest you update Apache Flink to a version greater than 1.11.3 in order to fix this vulnerability.

Automated human-like penetration testing for your web apps & APIs
Teams using Beagle Security are set up in minutes, embrace release-based CI/CD security testing and save up to 65% with timely remediation of vulnerabilities. Sign up for a free account to see what it can do for you.

Written by
Anandhu K A
Anandhu K A
Lead Engineer
Find website security issues in a flash
Improve your website's security posture with proactive vulnerability detection.
Free website security assessment
Experience the power of automated penetration testing & contextual reporting.