Lucene search

K

4 matches found

CVE
CVE
added 2020/10/01 8:15 p.m.70 views

CVE-2020-9491

In Apache NiFi 1.2.0 to 1.11.4, the NiFi UI and API were protected by mandating TLS v1.2, as well as listening connections established by processors like ListenHTTP, HandleHttpRequest, etc. However intracluster communication such as cluster request replication, Site-to-Site, and load balanced queue...

7.5CVSS7.5AI score0.02825EPSS
CVE
CVE
added 2020/10/01 8:15 p.m.67 views

CVE-2020-9486

In Apache NiFi 1.10.0 to 1.11.4, the NiFi stateless execution engine produced log output which included sensitive property values. When a flow was triggered, the flow definition configuration JSON was printed, potentially containing sensitive values in plaintext.

7.5CVSS7.4AI score0.0058EPSS
CVE
CVE
added 2020/10/01 8:15 p.m.66 views

CVE-2020-13940

In Apache NiFi 1.0.0 to 1.11.4, the notification service manager and various policy authorizer and user group provider objects allowed trusted administrators to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE).

5.5CVSS5.4AI score0.01252EPSS
CVE
CVE
added 2020/10/01 8:15 p.m.62 views

CVE-2020-9487

In Apache NiFi 1.0.0 to 1.11.4, the NiFi download token (one-time password) mechanism used a fixed cache size and did not authenticate a request to create a download token, only when attempting to use the token to access the content. An unauthenticated user could repeatedly request download tokens,...

7.5CVSS7.5AI score0.00638EPSS