First published: Mon Jul 08 2024(Updated: )
Apache NiFi 1.10.0 through 1.26.0 and 2.0.0-M1 through 2.0.0-M3 support a description field in the Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session context of the authenticated user. Upgrading to Apache NiFi 1.27.0 or 2.0.0-M4 is the recommended mitigation.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.nifi:nifi-web-ui | >=2.0.0-M1<2.0.0-M4 | 2.0.0-M4 |
maven/org.apache.nifi:nifi-web-ui | >=1.10.0<1.27.0 | 1.27.0 |
Apache NiFi | >=1.10.0<1.27.0 | |
Apache NiFi | =2.0.0-milestone1 | |
Apache NiFi | =2.0.0-milestone1-rc1 | |
Apache NiFi | =2.0.0-milestone1-rc2 | |
Apache NiFi | =2.0.0-milestone1-rc3 | |
Apache NiFi | =2.0.0-milestone1-rc4 | |
Apache NiFi | =2.0.0-milestone1-rc5 | |
Apache NiFi | =2.0.0-milestone1-rc6 | |
Apache NiFi | =2.0.0-milestone2 | |
Apache NiFi | =2.0.0-milestone2-rc1 | |
Apache NiFi | =2.0.0-milestone2-rc2 | |
Apache NiFi | =2.0.0-milestone2-rc3 | |
Apache NiFi | =2.0.0-milestone2-rc4 | |
Apache NiFi | =2.0.0-milestone3 | |
Apache NiFi | =2.0.0-milestone3-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-37389 is considered high due to the potential for cross-site scripting attacks.
To fix CVE-2024-37389, upgrade to Apache NiFi version 1.27.0 or 2.0.0-M4.
CVE-2024-37389 affects Apache NiFi versions 1.10.0 through 1.26.0 and 2.0.0-M1 through 2.0.0-M3.
CVE-2024-37389 is a cross-site scripting (XSS) vulnerability.
No, an authenticated user with permissions to configure Parameters Context can exploit CVE-2024-37389.