logo

CVE-2020-9482 org.apache.nifi.registry:nifi-registry-web-api

Package

Manager: maven
Name: org.apache.nifi.registry:nifi-registry-web-api
Vulnerable Version: >=0.1.0 <0.7.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00923 pctl0.75124

Details

Insufficient Session Expiration in Apache NiFi Registry If NiFi Registry 0.1.0 to 0.5.0 uses an authentication mechanism other than PKI, when the user clicks Log Out, NiFi Registry invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to NiFi Registry.

Metadata

Created: 2022-02-09T00:23:06Z
Modified: 2022-02-09T00:23:06Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-rcwj-2hj2-vmjj/GHSA-rcwj-2hj2-vmjj.json
CWE IDs: ["CWE-613"]
Alternative ID: GHSA-rcwj-2hj2-vmjj
Finding: F076
Auto approve: 1