Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 22, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 22, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 22, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 22, 2025

      Sam Altman says ChatGPT’s viral Ghibli effect “forced OpenAI to do a lot of unnatural things”

      May 22, 2025

      How to get started with Microsoft Copilot on Windows 11

      May 22, 2025

      Microsoft blocks employees from sending emails that mention “Palestine” or “Gaza”

      May 22, 2025

      I missed out on the Clair Obscur: Expedition 33 Collector’s Edition but thankfully, the developers are launching something special

      May 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Perficient is Shaping the Future of Salesforce Innovation

      May 22, 2025
      Recent

      Perficient is Shaping the Future of Salesforce Innovation

      May 22, 2025

      Opal – Optimizely’s AI-Powered Marketing Assistant

      May 22, 2025

      Content Compliance Without the Chaos: How Optimizely CMP Empowers Financial Services Marketers

      May 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Sam Altman says ChatGPT’s viral Ghibli effect “forced OpenAI to do a lot of unnatural things”

      May 22, 2025
      Recent

      Sam Altman says ChatGPT’s viral Ghibli effect “forced OpenAI to do a lot of unnatural things”

      May 22, 2025

      How to get started with Microsoft Copilot on Windows 11

      May 22, 2025

      Microsoft blocks employees from sending emails that mention “Palestine” or “Gaza”

      May 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»CISA Says 4-Year-Old Apache Flink Vulnerability Still Under Active Exploitation

    CISA Says 4-Year-Old Apache Flink Vulnerability Still Under Active Exploitation

    May 24, 2024

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added a four-year-old security flaw affecting Apache Flink to its Known Exploited Vulnerabilities (KEV) catalog, following evidence of active exploitation.

    The flaw, tracked as CVE-2020-17519, poses significant risks due to improper access control, allowing unauthorized access to sensitive information.

    Researchers Observed Active Exploitation of Apache Flink Vulnerability

    CISA describes vulnerabilities such as the Apache Flink Vulnerability which have been added to its Known Exploited Vulnerabilities catalog as “frequent attack vectors for malicious cyber actors” and as posing significant risks to the federal enterprise. The catalog serves as a critical resource for identifying and mitigating vulnerabilities actively in use.

    CVE-2020-17519 is a critical vulnerability in Apache Flink, an open-source framework for stream-processing and batch-processing. The flaw arises from improper access control in versions 1.11.0, 1.11.1, and 1.11.2 of the framework, potentially enabling remote attackers to access files specific to the local JobManager filesystem through the use of specially crafted directory traversal requests, leading to unauthorized access.

    While precise details of ongoing campaigns exploiting the Apache Flink Vulnerability remain unclear, the bug has existed for at least four years and has been acknowledged by a project maintainer. The project Apache Flink thread states:
    A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process.
    Access is restricted to files accessible by the JobManager process.
    The discovery of the vulnerability was credited to “0rich1” from Ant Security FG Lab, with working exploit code of the vulnerability available on the public web. In the same year, researchers from Palo Alto Networks had observed the vulnerability among the most commonly exploited vulnerabilities during the Winter 2020 period using information collected between November 2020 and January 2021.

    Mitigation Measures and Binding Directives

    The Apache Software Foundation addressed this issue in January 2021 with the release of Flink versions 1.11.3 and 1.12.0 to the master branch of the project. Users running affected versions are strongly urged to upgrade to these versions to secure their systems.

    CISA has mandated federal agencies to apply necessary patches by June 13, 2024. This directive operates under the Binding Operational Directive (BOD) which requires Federal Civilian Executive Branch (FCEB) agencies to implement fixes for listings in the Known Exploited Vulnerabilities Catalog to protect agency networks against active threats.

    Although the directive only applies to FCEB agencies, CISA has urged all organizations to reduce their exposure to cyberattacks through applying the mitigations in the catalog as per vendor instructions or to discontinue the use of affected products if mitigations are unavailable.

    In 2022, a critical vulnerability discovered in Apache Commons Text potentially granted threat actors access to remote servers. While fixes were soon released for both vulnerabilities, these incidents highlight the importance of timely updates and patches for vulnerabilities present in widely deployed open-source projects, frameworks and components.

    Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleHow Do Hackers Blend In So Well? Learn Their Tricks in This Expert Webinar
    Next Article An ‘Unwelcome Development’ in MediSecure Data Breach Incident

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 23, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-48695 – CyberDAVA Privilege Escalation Vulnerability

    May 23, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    MangoJuice is a GUI tool to configure MangoHud

    Linux

    Valve Unveils New SteamOS Compatibility for Your Device, Here’s What You Should Know

    Operating Systems

    Trajectory Flow Matching (TFM): A Simulation-Free Training Algorithm for Neural Differential Equation Models

    Development

    British Prime Minister wants access to messaging apps

    Development

    Highlights

    How to Run more than 1 Query through JMeter to do load testing

    June 11, 2024

    I got a job to do load testing on database. The problem is I have 3 queries that need to run one after another to get the result as below sequence.

    UPDATE db_swim_dev.ios_upgrade_css_site_selection SET
    pre_check=’PROCESSING’ WHERE id=’Dynamic Value need to fetch
    from CSV’;
    INSERT INTO db_swim_dev.tbl_ios_css_checks (id, hostname,
    r0_state, r1_state, device_type, version, issu_ready,
    licence_advancedmetroipaccess, licence_status, device_model,
    software_state, cust_special, power_state, fan_state,
    output, ios_image_update, job_id, site_master_id, rcount,
    mmcblk0) VALUES (”, ‘dynamic value need to fetch from CSV’, ”,
    ”, ‘920o’, ‘V156_2_SP_SR680887239_8’, ‘0’, ‘0’, ‘1’, ‘0’, ‘0’, ‘0’,
    ‘0’, ‘0’,
    ‘a:3:{s:11:”device_type”;s:4:”920o”;s:14:”licence_status”;i:1;s:7:”mmcblk0″;i:0;}’,
    ‘0’, ‘246’, ‘19442’, ‘0’, ‘0’);
    UPDATE db_swim_dev.ios_upgrade_css_site_selection SET
    pre_check=’FAILED’ WHERE id=’Dynamic value need to fetch from
    CSV’;

    I am not sure how to do that. I tried to run all the queries together getting an error. If anyone has encountered the same scenario please let me know how to make this work.

    New open-source tool helps to detangle the brain

    August 14, 2024

    SolarWinds Patches 8 Critical Flaws in Access Rights Manager Software

    July 26, 2024

    Selenium IDE type not saving text

    August 11, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.