First published: Thu Oct 19 2017(Updated: )
In Apache NiFi before 0.7.2 and 1.x before 1.1.2 in a cluster environment, the proxy chain serialization/deserialization is vulnerable to an injection attack where a carefully crafted username could impersonate another user and gain their permissions on a replicated request to another node.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache NiFi | =0.7.0 | |
Apache NiFi | =0.7.1 | |
Apache NiFi | =1.1.0 | |
Apache NiFi | =1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5636 has been classified as a critical vulnerability due to its potential to allow unauthorized user impersonation in Apache NiFi.
To fix CVE-2017-5636, you should upgrade to Apache NiFi version 1.1.2 or later, or 0.7.2.
CVE-2017-5636 exposes systems to injection attacks where crafted usernames can exploit user impersonation vulnerabilities.
CVE-2017-5636 is applicable to Apache NiFi versions 0.7.0, 0.7.1, 1.1.0, and 1.1.1 prior to their corresponding patches.
In clustered environments, CVE-2017-5636 allows attackers to gain unauthorized permissions on replicated requests, resulting in security breaches.