CWE
532
Advisory Published
CVE Published
Advisory Published
Updated

CVE-2024-52067: Apache NiFi: Potential Insertion of Sensitive Parameter Values in Debug Log

First published: Wed Nov 20 2024(Updated: )

Apache NiFi 1.16.0 through 1.28.0 and 2.0.0-M1 through 2.0.0-M4 include optional debug logging of Parameter Context values during the flow synchronization process. An authorized administrator with access to change logging levels could enable debug logging for framework flow synchronization, causing the application to write Parameter names and values to the application log. Parameter Context values may contain sensitive information depending on application flow configuration. Deployments of Apache NiFi with the default Logback configuration do not log Parameter Context values. Upgrading to Apache NiFi 2.0.0 or 1.28.1 is the recommendation mitigation, eliminating Parameter value logging from the flow synchronization process regardless of the Logback configuration.

Credit: security@apache.org

Affected SoftwareAffected VersionHow to fix
Apache NiFi>=1.16.0<=1.28.0>=2.0.0-M1<=2.0.0-M4
maven/org.apache.nifi:nifi-framework-core>=2.0.0-M1<=2.0.0-M4
2.0.0
maven/org.apache.nifi:nifi-framework-core>=1.16.0<1.28.1
1.28.1
Apache NiFi>=1.16.0<1.28.1
Apache NiFi=2.0.0-milestone1
Apache NiFi=2.0.0-milestone1-rc1
Apache NiFi=2.0.0-milestone1-rc2
Apache NiFi=2.0.0-milestone1-rc3
Apache NiFi=2.0.0-milestone1-rc4
Apache NiFi=2.0.0-milestone1-rc5
Apache NiFi=2.0.0-milestone1-rc6
Apache NiFi=2.0.0-milestone2
Apache NiFi=2.0.0-milestone2-rc1
Apache NiFi=2.0.0-milestone2-rc2
Apache NiFi=2.0.0-milestone2-rc3
Apache NiFi=2.0.0-milestone2-rc4
Apache NiFi=2.0.0-milestone3
Apache NiFi=2.0.0-milestone3-rc1
Apache NiFi=2.0.0-milestone4
Apache NiFi=2.0.0-milestone4-rc1
>=1.16.0<1.28.1
=2.0.0-milestone1
=2.0.0-milestone1-rc1
=2.0.0-milestone1-rc2
=2.0.0-milestone1-rc3
=2.0.0-milestone1-rc4
=2.0.0-milestone1-rc5
=2.0.0-milestone1-rc6
=2.0.0-milestone2
=2.0.0-milestone2-rc1
=2.0.0-milestone2-rc2
=2.0.0-milestone2-rc3
=2.0.0-milestone2-rc4
=2.0.0-milestone3
=2.0.0-milestone3-rc1
=2.0.0-milestone4
=2.0.0-milestone4-rc1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What are the affected versions in CVE-2024-52067?

    CVE-2024-52067 affects Apache NiFi versions 1.16.0 through 1.28.0 and 2.0.0-M1 through 2.0.0-M4.

  • What is the severity of CVE-2024-52067?

    The severity of CVE-2024-52067 is classified as moderate due to the risk of unintended exposure of sensitive data through debug logging.

  • How can I remediate CVE-2024-52067?

    To remediate CVE-2024-52067, update to Apache NiFi version 1.28.1 or later, or upgrade to version 2.0.0.

  • Who is affected by CVE-2024-52067?

    Authorized administrators who have access to change logging levels on affected versions of Apache NiFi are particularly vulnerable.

  • What type of vulnerability is CVE-2024-52067?

    CVE-2024-52067 is a vulnerability that involves optional debug logging of Parameter Context values that can expose sensitive data during flow synchronization.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203