First published: Mon Jun 12 2023(Updated: )
The JndiJmsConnectionFactoryProvider Controller Service, along with the ConsumeJMS and PublishJMS Processors, in Apache NiFi 1.8.0 through 1.21.0 allow an authenticated and authorized user to configure URL and library properties that enable deserialization of untrusted data from a remote location. The resolution validates the JNDI URL and restricts locations to a set of allowed schemes. You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache NiFi | >=1.8.0<=1.21.0 | |
maven/org.apache.nifi:nifi-jms-processors | >=1.8.0<1.22.0 | 1.22.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-34212 is medium with a severity value of 6.5.
CVE-2023-34212 affects Apache NiFi versions 1.8.0 through 1.21.0.
The vulnerability in CVE-2023-34212 allows an authenticated and authorized user to configure URL and library properties that enable deserialization of untrusted data from a remote location.
To fix CVE-2023-34212, upgrade Apache NiFi to a version beyond 1.21.0.
More information about CVE-2023-34212 can be found at the following references: - [http://www.openwall.com/lists/oss-security/2023/06/12/2](http://www.openwall.com/lists/oss-security/2023/06/12/2) - [https://lists.apache.org/thread/w5rm46fxmvxy216tglf0dv83wo6gnzr5](https://lists.apache.org/thread/w5rm46fxmvxy216tglf0dv83wo6gnzr5) - [https://nifi.apache.org/security.html#CVE-2023-34212](https://nifi.apache.org/security.html#CVE-2023-34212)