First published: Mon Nov 27 2023(Updated: )
Apache NiFi 0.7.0 through 1.23.2 include the JoltTransformJSON Processor, which provides an advanced configuration user interface that is vulnerable to DOM-based cross-site scripting. If an authenticated user, who is authorized to configure a JoltTransformJSON Processor, visits a crafted URL, then arbitrary JavaScript code can be executed within the session context of the authenticated user. Upgrading to Apache NiFi 1.24.0 or 2.0.0-M1 is the recommended mitigation.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.nifi:nifi-jolt-transform-json-ui | <1.24.0 | 1.24.0 |
Apache NiFi | >=0.7.0<1.24.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Apache NiFi vulnerability is CVE-2023-49145.
The title of the vulnerability is 'Apache NiFi: Improper Neutralization of Input in Advanced User Interface for Jolt'.
CVE-2023-49145 has a severity rating of 7.9 (high).
Apache NiFi versions 0.7.0 through 1.23.2 are affected by this vulnerability.
To fix this vulnerability, update Apache NiFi to version 1.24.0 or later.