First published: Wed May 13 2020(Updated: )
A vulnerability in Apache Flink (1.1.0 to 1.1.5, 1.2.0 to 1.2.1, 1.3.0 to 1.3.3, 1.4.0 to 1.4.2, 1.5.0 to 1.5.6, 1.6.0 to 1.6.4, 1.7.0 to 1.7.2, 1.8.0 to 1.8.3, 1.9.0 to 1.9.2, 1.10.0) where, when running a process with an enabled JMXReporter, with a port configured via metrics.reporter.reporter_name>.port, an attacker with local access to the machine and JMX port can execute a man-in-the-middle attack using a specially crafted request to rebind the JMXRMI registry to one under the attacker's control. This compromises any connection established to the process via JMX, allowing extraction of credentials and any other transferred data. Reference: <a href="https://lists.apache.org/thread.html/r23e559dee1e69741557b5fe431846de1f1a5981356d0ddb9482df88a%40%3Cdev.flink.apache.org%3E">https://lists.apache.org/thread.html/r23e559dee1e69741557b5fe431846de1f1a5981356d0ddb9482df88a%40%3Cdev.flink.apache.org%3E</a>
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Flink | >=1.1.0<=1.1.5 | |
Apache Flink | >=1.2.0<=1.2.1 | |
Apache Flink | >=1.3.0<=1.3.3 | |
Apache Flink | >=1.4.0<=1.4.2 | |
Apache Flink | >=1.5.0<=1.5.6 | |
Apache Flink | >=1.6.0<=1.6.4 | |
Apache Flink | >=1.8.0<=1.8.3 | |
Apache Flink | >=1.9.0<=1.9.2 | |
Apache Flink | =1.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1960 is classified as a moderate severity vulnerability.
CVE-2020-1960 affects Apache Flink versions from 1.1.0 through 1.10.0, including various specific subversions.
To fix CVE-2020-1960, upgrade Apache Flink to a version that is not affected, specifically above 1.10.0.
CVE-2020-1960 is a vulnerability associated with the JMXReporter in Apache Flink that can lead to unauthorized access.
Yes, CVE-2020-1960 can potentially be exploited remotely if JMX reporting is enabled on an exposed port.