First published: Mon Oct 28 2024(Updated: )
Apache NiFi 1.10.0 through 1.27.0 and 2.0.0-M1 through 2.0.0-M3 support a description field for Parameters in a Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session context of the authenticated user. Upgrading to Apache NiFi 1.28.0 or 2.0.0-M4 is the recommended mitigation.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.nifi:nifi-web-ui | >=2.0.0-M1<2.0.0-M4 | 2.0.0-M4 |
maven/org.apache.nifi:nifi-web-ui | >=1.10.0<1.28.0 | 1.28.0 |
Apache NiFi | >=1.10.0<=1.27.0 | |
Apache NiFi | =2.0.0-milestone1 | |
Apache NiFi | =2.0.0-milestone2 | |
Apache NiFi | =2.0.0-milestone3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45477 is classified as a medium severity vulnerability due to its potential for cross-site scripting attacks.
To mitigate CVE-2024-45477, upgrade your Apache NiFi installation to version 1.28.0 or 2.0.0-M4 or later.
CVE-2024-45477 affects Apache NiFi versions from 1.10.0 to 1.27.0 and from 2.0.0-M1 to 2.0.0-M3.
CVE-2024-45477 is a cross-site scripting vulnerability that allows an authenticated user to inject malicious JavaScript.
Authenticated users who can configure Parameter Contexts in affected versions of Apache NiFi are at risk from CVE-2024-45477.