Follow @Openwall on Twitter for new release announcements and other news
[<prev] [day] [month] [year] [list]
Message-ID: <9bad0c80-8ba9-b369-8656-a38683a35c58@apache.org>
Date: Wed, 20 Nov 2024 17:20:33 +0000
From: David Handermann <exceptionfactory@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2024-52067: Apache NiFi: Potential Insertion of Sensitive
 Parameter Values in Debug Log 

Affected versions:

- Apache NiFi 1.16.0 through 1.28.0
- Apache NiFi 2.0.0-M1 through 2.0.0-M4

Description:

Apache NiFi 1.16.0 through 1.28.0 and 2.0.0-M1 through 2.0.0-M4 include optional debug logging of Parameter Context values during the flow synchronization process. An authorized administrator with access to change logging levels could enable debug logging for framework flow synchronization, causing the application to write Parameter names and values to the application log. Parameter Context values may contain sensitive information depending on application flow configuration. Deployments of Apache NiFi with the default Logback configuration do not log Parameter Context values. Upgrading to Apache NiFi 2.0.0 or 1.28.1 is the recommendation mitigation, eliminating Parameter value logging from the flow synchronization process regardless of the Logback configuration.

This issue is being tracked as NIFI-13971 

Credit:

David Handermann (finder)

References:

https://nifi.apache.org/
https://www.cve.org/CVERecord?id=CVE-2024-52067
https://issues.apache.org/jira/browse/NIFI-13971

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.