First published: Mon Oct 28 2024(Updated: )
Apache NiFi 1.10.0 through 1.27.0 and 2.0.0-M1 through 2.0.0-M3 support a description field for Parameters in a Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session context of the authenticated user. Upgrading to Apache NiFi 1.28.0 or 2.0.0-M4 is the recommended mitigation.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.nifi:nifi-web-ui | >=2.0.0-M1<2.0.0-M4 | 2.0.0-M4 |
maven/org.apache.nifi:nifi-web-ui | >=1.10.0<1.28.0 | 1.28.0 |
Apache NiFi | >=1.10.0<=1.27.0 | |
Apache NiFi | =2.0.0-milestone1 | |
Apache NiFi | =2.0.0-milestone2 | |
Apache NiFi | =2.0.0-milestone3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.