Apache

Nifi

43 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.25%
  • Published 01.10.2020 20:15:13
  • Last modified 21.11.2024 05:02:11

In Apache NiFi 1.0.0 to 1.11.4, the notification service manager and various policy authorizer and user group provider objects allowed trusted administrators to inadvertently configure a potentially malicious XML file. The XML file has the ability to...

  • EPSS 0.17%
  • Published 11.02.2020 21:15:11
  • Last modified 21.11.2024 05:11:40

In Apache NiFi 0.0.1 to 1.11.0, the flow fingerprint factory generated flow fingerprints which included sensitive property descriptor values. In the event a node attempted to join a cluster and the cluster flow was not inheritable, the flow fingerpri...

  • EPSS 0.64%
  • Published 28.01.2020 01:15:12
  • Last modified 21.11.2024 05:11:38

A XSS vulnerability was found in Apache NiFi 1.0.0 to 1.10.0. Malicious scripts could be injected to the UI through action by an unaware authenticated user in Firefox. Did not appear to occur in other browsers.

  • EPSS 0.45%
  • Published 28.01.2020 01:15:12
  • Last modified 21.11.2024 05:11:37

An information disclosure vulnerability was found in Apache NiFi 1.10.0. The sensitive parameter parser would log parsed values for debugging purposes. This would expose literal values entered in a sensitive property when no parameter was present.

  • EPSS 0.32%
  • Published 19.11.2019 22:15:11
  • Last modified 21.11.2024 04:22:48

When using an authentication mechanism other than PKI, when the user clicks Log Out in NiFi versions 1.0.0 to 1.9.2, NiFi invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to...

  • EPSS 0.27%
  • Published 19.11.2019 22:15:11
  • Last modified 21.11.2024 04:18:21

When updating a Process Group via the API in NiFi versions 1.3.0 to 1.9.2, the response to the request includes all of its contents (at the top most level, not recursively). The response included details about processors and controller services which...

  • EPSS 0.51%
  • Published 19.11.2019 22:15:11
  • Last modified 21.11.2024 04:18:21

The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the v...

  • EPSS 0.26%
  • Published 20.08.2019 21:15:12
  • Last modified 21.11.2024 04:18:22

In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by defa...

  • EPSS 0.32%
  • Published 19.12.2018 14:29:00
  • Last modified 21.11.2024 03:54:03

The X-Frame-Options headers were applied inconsistently on some HTTP responses, resulting in duplicate or missing security headers. Some browsers would interpret these results incorrectly, allowing clickjacking attacks. Mitigation: The fix to consist...

  • EPSS 1.14%
  • Published 19.12.2018 14:29:00
  • Last modified 21.11.2024 03:54:03

The message-page.jsp error page used the value of the HTTP request header X-ProxyContextPath without sanitization, resulting in a reflected XSS attack. Mitigation: The fix to correctly parse and sanitize the request attribute value was applied on the...