First published: Mon Jun 12 2023(Updated: )
The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution. The resolution validates the Database URL and rejects H2 JDBC locations. You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache NiFi | >=0.0.2<1.22.0 | |
maven/org.apache.nifi:nifi-hikari-dbcp-service | >=0.0.2<1.22.0 | 1.22.0 |
maven/org.apache.nifi:nifi-dbcp-base | >=0.0.2<1.22.0 | 1.22.0 |
maven/org.apache.nifi:nifi-dbcp-service-nar | >=0.0.2<1.22.0 | 1.22.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-34468 is high.
The vulnerability in Apache NiFi 0.0.2 through 1.21.0 is the ability for an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution.
An attacker can exploit CVE-2023-34468 by configuring a malicious Database URL with the H2 driver and executing custom code.
To fix CVE-2023-34468, update Apache NiFi to version 1.22.0 or later.
The Common Weakness Enumeration (CWE) ID for CVE-2023-34468 is CWE-94.