First published: Fri Feb 10 2023(Updated: )
The ExtractCCDAAttributes Processor in Apache NiFi 1.2.0 through 1.19.1 does not restrict XML External Entity references. Flow configurations that include the ExtractCCDAAttributes Processor are vulnerable to malicious XML documents that contain Document Type Declarations with XML External Entity references. The resolution disables Document Type Declarations and disallows XML External Entity resolution in the ExtractCCDAAttributes Processor.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache NiFi | >=1.2.0<=1.19.1 | |
maven/org.apache.nifi:nifi-ccda-processors | >=1.2.0<1.20.0 | 1.20.0 |
>=1.2.0<=1.19.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22832 is a vulnerability in Apache NiFi 1.2.0 through 1.19.1 that allows malicious XML documents to exploit XML External Entity references in the ExtractCCDAAttributes Processor.
CVE-2023-22832 has a severity rating of 7.5, which is considered high.
CVE-2023-22832 impacts Apache NiFi by potentially allowing malicious XML documents to exploit XML External Entity references in the ExtractCCDAAttributes Processor, leading to potential security breaches.
To fix CVE-2023-22832 in Apache NiFi, you should update your installation to a version that is not affected, specifically a version higher than 1.19.1.
You can find more information about CVE-2023-22832 on the Apache NiFi security page and the Apache mailing list.