Lucene search

K
githubGitHub Advisory DatabaseGHSA-68PR-6FJC-WMGM
HistoryNov 28, 2023 - 12:30 a.m.

Improper Neutralization of Input in Advanced User Interface for Jolt

2023-11-2800:30:33
CWE-79
GitHub Advisory Database
github.com
5
apache nifi
jolttransformjson
dom-based cross-site scripting
user interface
security vulnerability
javascript execution
authentication
authorization
upgrade mitigation

7.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.7%

Apache NiFi 0.7.0 through 1.23.2 include the JoltTransformJSON Processor, which provides an advanced configuration user interface that is vulnerable to DOM-based cross-site scripting. If an authenticated user, who is authorized to configure a JoltTransformJSON Processor, visits a crafted URL, then arbitrary JavaScript code can be executed within the session context of the authenticated user. Upgrading to Apache NiFi 1.24.0 or 2.0.0-M1 is the recommended mitigation.

Affected configurations

Vulners
Node
org.apache.nifi\Matchnifi

7.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.7%

Related for GHSA-68PR-6FJC-WMGM