Lucene search

K

Nifi Security Vulnerabilities - 2023

cve
cve

CVE-2023-22832

The ExtractCCDAAttributes Processor in Apache NiFi 1.2.0 through 1.19.1 does not restrict XML External Entity references. Flow configurations that include the ExtractCCDAAttributes Processor are vulnerable to malicious XML documents that contain Document Type Declarations with XML External Entity r...

7.5CVSS

7.4AI Score

0.001EPSS

2023-02-10 08:15 AM
38
cve
cve

CVE-2023-34212

The JndiJmsConnectionFactoryProvider Controller Service, along with the ConsumeJMS and PublishJMS Processors, in Apache NiFi 1.8.0 through 1.21.0 allow an authenticated and authorized user to configure URL and library properties that enable deserialization of untrusted data from a remote location. ...

6.5CVSS

6.4AI Score

0.002EPSS

2023-06-12 04:15 PM
28
cve
cve

CVE-2023-34468

The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution. The resolution validates the Database URL and rejects H2 JDBC locat...

8.8CVSS

8.5AI Score

0.89EPSS

2023-06-12 04:15 PM
52
cve
cve

CVE-2023-36542

Apache NiFi 0.0.2 through 1.22.0 include Processors and Controller Services that support HTTP URL references for retrieving drivers, which allows an authenticated and authorized user to configure a location that enables custom code execution. The resolution introduces a new Required Permission for ...

8.8CVSS

8.7AI Score

0.008EPSS

2023-07-29 08:15 AM
50
cve
cve

CVE-2023-40037

Apache NiFi 1.21.0 through 1.23.0 support JDBC and JNDI JMS access in several Processors and Controller Services with connection URL validation that does not provide sufficient protection against crafted inputs. An authenticated and authorized user can bypass connection URL validation using custom ...

6.5CVSS

6.3AI Score

0.002EPSS

2023-08-18 10:15 PM
39
cve
cve

CVE-2023-49145

Apache NiFi 0.7.0 through 1.23.2 include the JoltTransformJSON Processor, which provides an advanced configuration user interface that is vulnerable to DOM-based cross-site scripting. If an authenticated user, who is authorized to configure a JoltTransformJSON Processor, visits a crafted URL, then ...

7.9CVSS

5.1AI Score

0.001EPSS

2023-11-27 11:15 PM
31