Apache Flink Unauthorized Access Vulnerability

Vulnerability Description

The Apache Flink Dashboard has no user authentication by default. An attacker can directly upload a trojan jar package through the unauthorized Flink Dashboard console and remotely execute any system command to obtain server privileges.

Environment setup

Test version: flink-1.15.1

Modify flink-1.15.1/conf/flink-conf.yaml,open 8081 port.

image-20230130110811353

Start Flink:

Vulnerability Exploitation

Access the web page.

image-20230130110857282

Use msfvenom to generate rce.jar:

Configure msf listening:

Upload the rec.jar file at Submit New Job, click submit.

image-20230130110921888

Successful get shell.

image-20230130110926718

Last updated