CVE-2020-9482 – org.apache.nifi.registry:nifi-registry-web-api
Package
Manager: maven
Name: org.apache.nifi.registry:nifi-registry-web-api
Vulnerable Version: >=0.1.0 <0.7.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00923 pctl0.75124
Details
Insufficient Session Expiration in Apache NiFi Registry If NiFi Registry 0.1.0 to 0.5.0 uses an authentication mechanism other than PKI, when the user clicks Log Out, NiFi Registry invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to NiFi Registry.
Metadata
Created: 2022-02-09T00:23:06Z
Modified: 2022-02-09T00:23:06Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-rcwj-2hj2-vmjj/GHSA-rcwj-2hj2-vmjj.json
CWE IDs: ["CWE-613"]
Alternative ID: GHSA-rcwj-2hj2-vmjj
Finding: F076
Auto approve: 1