|
Message-ID: <5554dc12-26ae-13a7-6693-7dbff66cf62b@apache.org> Date: Mon, 28 Oct 2024 19:34:26 +0000 From: David Handermann <exceptionfactory@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2024-45477: Apache NiFi: Improper Neutralization of Input in Parameter Description Affected versions: - Apache NiFi 1.10.0 through 1.27.0 - Apache NiFi 2.0.0-M1 through 2.0.0-M3 Description: Apache NiFi 1.10.0 through 1.27.0 and 2.0.0-M1 through 2.0.0-M3 support a description field for Parameters in a Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session context of the authenticated user. Upgrading to Apache NiFi 1.28.0 or 2.0.0-M4 is the recommended mitigation. This issue is being tracked as NIFI-13675 Credit: Muhammad Hazim Bin Nor Aizi (finder) References: https://nifi.apache.org/ https://www.cve.org/CVERecord?id=CVE-2024-45477 https://issues.apache.org/jira/browse/NIFI-13675 Timeline: 2024-08-23: reported 2024-08-23: confirmed 2024-08-25: resolved
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.