First published: Wed Dec 19 2018(Updated: )
The message-page.jsp error page used the value of the HTTP request header X-ProxyContextPath without sanitization, resulting in a reflected XSS attack. Mitigation: The fix to correctly parse and sanitize the request attribute value was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache NiFi | >=1.0.0<=1.7.1 | |
maven/org.apache.nifi:nifi | >=1.0.0<=1.7.1 | 1.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17193 is a vulnerability that allows for a reflected XSS attack in the message-page.jsp error page of Apache NiFi.
CVE-2018-17193 has a severity score of 6.1, which is considered medium.
To mitigate CVE-2018-17193, update to Apache NiFi 1.8.0 or later which includes a fix to correctly parse and sanitize the request attribute value.
The affected software for CVE-2018-17193 is Apache NiFi versions 1.0.0 to 1.7.1.
Yes, you can find more information about CVE-2018-17193 at the following link: https://nifi.apache.org/security.html#CVE-2018-17193