First published: Tue Oct 10 2017(Updated: )
An authorized user could upload a template which contained malicious code and accessed sensitive files via an XML External Entity (XXE) attack. The fix to properly handle XML External Entities was applied on the Apache NiFi 1.4.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache NiFi | =1.0.0 | |
Apache NiFi | =1.0.1 | |
Apache NiFi | =1.1.0 | |
Apache NiFi | =1.1.1 | |
Apache NiFi | =1.1.2 | |
Apache NiFi | =1.2.0 | |
Apache NiFi | =1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12623 is categorized as a high severity vulnerability due to its potential to allow unauthorized file access through an XML External Entity attack.
To fix CVE-2017-12623, users must upgrade their Apache NiFi installation to version 1.4.0 or later.
CVE-2017-12623 allows for XML External Entity (XXE) attacks, which can be exploited by uploading malicious templates.
CVE-2017-12623 affects Apache NiFi versions 1.0.0 through 1.3.0.
No, CVE-2017-12623 is not a concern for users running Apache NiFi version 1.4.0 or newer, as it contains the necessary security fixes.