Apache

Nifi

43 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.13%
  • Veröffentlicht 10.02.2023 08:15:12
  • Zuletzt bearbeitet 24.03.2025 17:15:14

The ExtractCCDAAttributes Processor in Apache NiFi 1.2.0 through 1.19.1 does not restrict XML External Entity references. Flow configurations that include the ExtractCCDAAttributes Processor are vulnerable to malicious XML documents that contain Doc...

  • EPSS 2.39%
  • Veröffentlicht 15.06.2022 15:15:08
  • Zuletzt bearbeitet 21.11.2024 07:07:35

The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. Th...

  • EPSS 1.17%
  • Veröffentlicht 30.04.2022 08:15:06
  • Zuletzt bearbeitet 21.11.2024 06:58:50

Multiple components in Apache NiFi 0.0.1 to 1.16.0 do not restrict XML External Entity references in the default configuration. The Standard Content Viewer service attempts to resolve XML External Entity references when viewing formatted XML files. T...

  • EPSS 0.76%
  • Veröffentlicht 06.04.2022 18:15:09
  • Zuletzt bearbeitet 21.11.2024 06:54:38

When creating or updating credentials for single-user access, Apache NiFi wrote a copy of the Login Identity Providers configuration to the operating system temporary directory. On most platforms, the operating system temporary directory has global r...

  • EPSS 0.17%
  • Veröffentlicht 17.12.2021 09:15:07
  • Zuletzt bearbeitet 21.11.2024 06:30:26

In the TransformXML processor of Apache NiFi before 1.15.1 an authenticated user could configure an XSLT file which, if it included malicious external entity calls, may reveal sensitive information.

  • EPSS 33.82%
  • Veröffentlicht 26.02.2021 22:15:19
  • Zuletzt bearbeitet 20.08.2025 10:15:27

In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) ...

  • EPSS 0.32%
  • Veröffentlicht 19.01.2021 17:15:13
  • Zuletzt bearbeitet 27.08.2025 21:15:36

A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

  • EPSS 2.83%
  • Veröffentlicht 01.10.2020 20:15:14
  • Zuletzt bearbeitet 21.11.2024 05:40:45

In Apache NiFi 1.2.0 to 1.11.4, the NiFi UI and API were protected by mandating TLS v1.2, as well as listening connections established by processors like ListenHTTP, HandleHttpRequest, etc. However intracluster communication such as cluster request r...

  • EPSS 0.64%
  • Veröffentlicht 01.10.2020 20:15:14
  • Zuletzt bearbeitet 21.11.2024 05:40:44

In Apache NiFi 1.0.0 to 1.11.4, the NiFi download token (one-time password) mechanism used a fixed cache size and did not authenticate a request to create a download token, only when attempting to use the token to access the content. An unauthenticat...

  • EPSS 0.58%
  • Veröffentlicht 01.10.2020 20:15:14
  • Zuletzt bearbeitet 21.11.2024 05:40:44

In Apache NiFi 1.10.0 to 1.11.4, the NiFi stateless execution engine produced log output which included sensitive property values. When a flow was triggered, the flow definition configuration JSON was printed, potentially containing sensitive values ...