Beyond Security Blog
laptop and network monitoring icons on blue gradient vector

Apache Flink 1.1.0 to 1.1.5 Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’) Vulnerability

Summary

When running a process with an enabled JMXReporter, with a port configured via metrics.reporter.<reporter_name>.port, an attacker with local access to the machine and JMX port can execute a man-in-the-middle attack using a specially crafted request to rebind the JMXRMI registry to one under the attacker’s control. This compromises any connection established to the process via JMX, allowing extraction of credentials and any other transferred data.

Credit:

The information has been provided by Jonathan Gallimore

The original article can be found at:https://lists.apache.org/thread.html/r23e559dee1e69741557b5fe431846de1f1a5981356d0ddb9482df88a%40%3Cdev.flink.apache.org%3E

Details

A vulnerability in Apache Flink (1.1.0 to 1.1.5, 1.2.0 to 1.2.1, 1.3.0 to 1.3.3, 1.4.0 to 1.4.2, 1.5.0 to 1.5.6, 1.6.0 to 1.6.4, 1.7.0 to 1.7.2, 1.8.0 to 1.8.3, 1.9.0 to 1.9.2, 1.10.0) where, when running a process with an enabled JMXReporter, with a port configured via metrics.reporter.reporter_name>.port, an attacker with local access to the machine and JMX port can execute a man-in-the-middle attack using a specially crafted request to rebind the JMXRMI registry to one under the attacker’s control. This compromises any connection established to the process via JMX, allowing extraction of credentials and any other transferred data.

Vulnerable Systems:

Apache Flink 1.1.0 to 1.1.5

Apache Flink 1.2.0 to 1.2.1

Apache Flink 1.3.0 to 1.3.3

Apache Flink 1.4.0 to 1.4.2

Apache Flink 1.5.0 to 1.5.6

Apache Flink 1.6.0 to 1.6.4

Apache Flink 1.7.0 to 1.7.2

Apache Flink 1.8.0 to 1.8.3

Apache Flink 1.9.0 to 1.9.2

Apache Flink 1.10.0

CVE Information:

CVE-2020-1960

Disclosure Timeline:
Published Date:5/14/2020

SecuriTeam

SecuriTeam is a small group within Beyond Security dedicated to bringing you the latest news and utilities in computer security.

Please visit our central security portal at securiteam.com to keep up-to-date with the latest security research and read our archives containing over 10,000 articles about CVEs and zero-day exploits.

Contact Us
Want to learn more? Fill out the form below and we'll be in touch shortly.
By clicking Submit, I agree to the use of my personal data in accordance with the Beyond Security Privacy Policy. Beyond Security will not sell, trade, lease, or rent your personal data to third parties.

Advertisement

Vector image of purple colored handshake icon

Affected by Covid-19? Get free vulnerability scanning.

Before You go

Take a second to book a demo. Learn how to secure your networks & applications.

We'll be in touch!

We now have the ability to scan at any time...like having sonar on our own network. We always know what is going on around us.”

man-img

Mike Gutknecht, Spectrum Brands