Headline
GHSA-23qf-3jf9-h3q9: Apache NiFi Insufficient Property Validation vulnerability
Apache NiFi 1.21.0 through 1.23.0 support JDBC and JNDI JMS access in several Processors and Controller Services with connection URL validation that does not provide sufficient protection against crafted inputs. An authenticated and authorized user can bypass connection URL validation using custom input formatting. The resolution enhances connection URL validation and introduces validation for additional related properties. Upgrading to Apache NiFi 1.23.1 is the recommended mitigation.
Skip to content
Actions
Automate any workflow
Packages
Host and manage packages
Security
Find and fix vulnerabilities
Codespaces
Instant dev environments
Copilot
Write better code with AI
Code review
Manage code changes
Issues
Plan and track work
Discussions
Collaborate outside of code
GitHub Sponsors
Fund open source developers
* The ReadME Project
GitHub community articles
- Pricing
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2023-40037
Apache NiFi Insufficient Property Validation vulnerability
Moderate severity GitHub Reviewed Published Aug 19, 2023 to the GitHub Advisory Database • Updated Aug 21, 2023
Package
maven org.apache.nifi:nifi-dbcp-base (Maven)
Affected versions
>= 1.21.0, < 1.23.1
maven org.apache.nifi:nifi-dbcp-service-api (Maven)
maven org.apache.nifi:nifi-dbcp-service-bundle (Maven)
maven org.apache.nifi:nifi-jms-processors (Maven)
Description
Published to the GitHub Advisory Database
Aug 19, 2023
Last updated
Aug 21, 2023
Related news
Apache NiFi 0.7.0 through 1.23.2 include the JoltTransformJSON Processor, which provides an advanced configuration user interface that is vulnerable to DOM-based cross-site scripting. If an authenticated user, who is authorized to configure a JoltTransformJSON Processor, visits a crafted URL, then arbitrary JavaScript code can be executed within the session context of the authenticated user. Upgrading to Apache NiFi 1.24.0 or 2.0.0-M1 is the recommended mitigation.
Apache NiFi 1.21.0 through 1.23.0 support JDBC and JNDI JMS access in several Processors and Controller Services with connection URL validation that does not provide sufficient protection against crafted inputs. An authenticated and authorized user can bypass connection URL validation using custom input formatting. The resolution enhances connection URL validation and introduces validation for additional related properties. Upgrading to Apache NiFi 1.23.1 is the recommended mitigation.