Apache Flink Unauthorized Access Vulnerability
PreviousActiveMQ Unauthorized Access VulnerabilityNextAtlassian Crowd Unauthorized Access Vulnerability
Last updated
Last updated
The Apache Flink Dashboard has no user authentication by default. An attacker can directly upload a trojan jar package through the unauthorized Flink Dashboard console and remotely execute any system command to obtain server privileges.
Test version: flink-1.15.1
Modify flink-1.15.1/conf/flink-conf.yaml
,open 8081 port.
Start Flink:
Access the web page.
Use msfvenom to generate rce.jar:
Configure msf listening:
Upload the rec.jar
file at Submit New Job, click submit.
Successful get shell.