First published: Thu Oct 01 2020(Updated: )
In Apache NiFi 1.10.0 to 1.11.4, the NiFi stateless execution engine produced log output which included sensitive property values. When a flow was triggered, the flow definition configuration JSON was printed, potentially containing sensitive values in plaintext.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.nifi:nifi-stateless | >=1.10.0<=1.11.4 | 1.12.0-RC1 |
Apache NiFi | >=1.0.0<=1.11.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-9486 is high with a severity value of 7.5.
Apache NiFi 1.10.0 to 1.11.4 may include sensitive property values in plaintext in the log output.
CVE-2020-9486 is fixed in Apache NiFi version 1.12.0-RC1.
You can find more information about CVE-2020-9486 on the NVD website (https://nvd.nist.gov/vuln/detail/CVE-2020-9486), in the Apache NiFi GitHub commit (https://github.com/apache/nifi/commit/148537d64a017b73160b0d49943183c18f883ab0), and on the Apache NiFi security page (https://nifi.apache.org/security#CVE-2020-9486).
The CWE ID for CVE-2020-9486 is 532.