|
Message-ID: <03c4e506-c64e-c997-2607-a8502a6d097e@apache.org> Date: Mon, 12 Jun 2023 14:26:41 +0000 From: David Handermann <exceptionfactory@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2023-34212: Apache NiFi: Potential Deserialization of Untrusted Data with JNDI in JMS Components Severity: important Affected versions: - Apache NiFi 1.8.0 through 1.21.0 Description: The JndiJmsConnectionFactoryProvider Controller Service, along with the ConsumeJMS and PublishJMS Processors, in Apache NiFi 1.8.0 through 1.21.0 allow an authenticated and authorized user to configure URL and library properties that enable deserialization of untrusted data from a remote location. The resolution validates the JNDI URL and restricts locations to a set of allowed schemes. This issue is being tracked as NIFI-11614 Credit: Veraxy00 of Qianxin TI Center (finder) Matei "Mal" Badanoiu (reporter) References: https://nifi.apache.org/security.html#CVE-2023-34212 https://nifi.apache.org/ https://www.cve.org/CVERecord?id=CVE-2023-34212 https://issues.apache.org/jira/browse/NIFI-11614 Timeline: 2023-05-28: reported 2023-05-29: confirmed 2023-06-01: resolved
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.