[
https://issues.apache.org/jira/browse/FLINK-18151?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Hequn Cheng updated FLINK-18151:
--------------------------------
Description:
For example, the code `if os.path.isfile(flink_conf_path):` contains CWE22
problem that calling "os.path.isfile" with the tainted value in argument 1.
This constructs a path or URI using the tainted value and may thus allow an
attacker to access, modify, or test the existence of critical or sensitive
files.
More information about CWE22 here:
https://cwe.mitre.org/data/definitions/22.html
was:For example, the code `if os.path.isfile(flink_conf_path):` contains
CWE22 problem that calling "os.path.isfile" with the tainted value in argument
1. This constructs a path or URI using the tainted value and may thus allow an
attacker to access, modify, or test the existence of critical or sensitive
files.
> Resolve CWE22 problems in pyflink_gateway_server.py
> ----------------------------------------------------
>
> Key: FLINK-18151
> URL: https://issues.apache.org/jira/browse/FLINK-18151
> Project: Flink
> Issue Type: Bug
> Components: API / Python
> Affects Versions: 1.10.1, 1.11.0, 1.12.0
> Reporter: Hequn Cheng
> Assignee: Shuiqiang Chen
> Priority: Critical
>
> For example, the code `if os.path.isfile(flink_conf_path):` contains CWE22
> problem that calling "os.path.isfile" with the tainted value in argument 1.
> This constructs a path or URI using the tainted value and may thus allow an
> attacker to access, modify, or test the existence of critical or sensitive
> files.
> More information about CWE22 here:
> https://cwe.mitre.org/data/definitions/22.html
--
This message was sent by Atlassian Jira
(v8.3.4#803005)