logo

CVE-2023-36542 org.apache.nifi:nifi-standard-processors

Package

Manager: maven
Name: org.apache.nifi:nifi-standard-processors
Vulnerable Version: >=0.0.2 <1.23.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00941 pctl0.75356

Details

Apache NiFi Code Injection vulnerability Apache NiFi 0.0.2 through 1.22.0 include Processors and Controller Services that support HTTP URL references for retrieving drivers, which allows an authenticated and authorized user to configure a location that enables custom code execution. The resolution introduces a new Required Permission for referencing remote resources, restricting configuration of these components to privileged users. The permission prevents unprivileged users from configuring Processors and Controller Services annotated with the new Reference Remote Resources restriction. Upgrading to Apache NiFi 1.23.0 is the recommended mitigation.

Metadata

Created: 2023-07-29T09:30:15Z
Modified: 2025-02-13T19:03:29Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-r969-8v3h-23v9/GHSA-r969-8v3h-23v9.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-r969-8v3h-23v9
Finding: F422
Auto approve: 1