logo

CVE-2020-9491 org.apache.nifi:nifi

Package

Manager: maven
Name: org.apache.nifi:nifi
Vulnerable Version: >=1.2.0 <1.12.0-rc1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.02825 pctl0.85624

Details

Inadequate Encryption Strength in Apache NiFi In Apache NiFi 1.2.0 to 1.11.4, the NiFi UI and API were protected by mandating TLS v1.2, as well as listening connections established by processors like ListenHTTP, HandleHttpRequest, etc. However intracluster communication such as cluster request replication, Site-to-Site, and load balanced queues continued to support TLS v1.0 or v1.1.

Metadata

Created: 2022-01-06T20:41:06Z
Modified: 2022-04-29T20:27:44Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-rfmp-jvr7-hx78/GHSA-rfmp-jvr7-hx78.json
CWE IDs: ["CWE-327"]
Alternative ID: GHSA-rfmp-jvr7-hx78
Finding: F052
Auto approve: 1