CVE-2024-37389 – org.apache.nifi:nifi-web-ui
Package
Manager: maven
Name: org.apache.nifi:nifi-web-ui
Vulnerable Version: >=1.10.0 <1.27.0 || >=2.0.0-m1 <2.0.0-m4
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
EPSS: 0.00814 pctl0.73404
Details
Apache NiFi vulnerable to Cross-site Scripting Apache NiFi 1.10.0 through 1.26.0 and 2.0.0-M1 through 2.0.0-M3 support a description field in the Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session context of the authenticated user. Upgrading to Apache NiFi 1.27.0 or 2.0.0-M4 is the recommended mitigation.
Metadata
Created: 2024-07-08T09:32:22Z
Modified: 2024-07-11T17:20:43Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/07/GHSA-h658-qqv9-qwv8/GHSA-h658-qqv9-qwv8.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-h658-qqv9-qwv8
Finding: F425
Auto approve: 1