Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <e9bc0330-6574-e4e4-711e-c47450c53e53@apache.org>
Date: Mon, 27 Nov 2023 21:58:37 +0000
From: David Handermann <exceptionfactory@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2023-49145: Apache NiFi: Improper Neutralization of Input in
 Advanced User Interface for Jolt 

Affected versions:

- Apache NiFi 0.7.0 through 1.23.2

Description:

Apache NiFi 0.7.0 through 1.23.2 include the JoltTransformJSON Processor, which provides an advanced configuration user interface that is vulnerable to DOM-based cross-site scripting. If an authenticated user, who is authorized to configure a JoltTransformJSON Processor, visits a crafted URL, then arbitrary
JavaScript code can be executed within the session context of the authenticated user. Upgrading to Apache NiFi 1.24.0 or 2.0.0-M1 is the recommended mitigation.

This issue is being tracked as NIFI-12403 

Credit:

Dr. Oliver Matula, DB Systel GmbH (finder)

References:

https://nifi.apache.org/security.html#CVE-2023-49145
https://nifi.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-49145
https://issues.apache.org/jira/browse/NIFI-12403

Timeline:

2023-11-22: reported
2023-11-22: confirmed
2023-11-22: resolved

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.