Описание
Apache NiFi Improper Input Validation vulnerability
When a client request to a cluster node was replicated to other nodes in the cluster for verification, the Content-Length was forwarded. On a DELETE request, the body was ignored, but if the initial request had a Content-Length value other than 0, the receiving nodes would wait for the body and eventually timeout. Mitigation: The fix to check DELETE requests and overwrite non-zero Content-Length header values was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2018-17194
- https://github.com/apache/nifi/commit/1baead6f525046a613fc4fe494a0d193776ea70f
- https://github.com/apache/nifi/commit/748cf745628dab20b7e71f12b5dcfe6ed0bbf134
- https://issues.apache.org/jira/browse/NIFI-5628
- https://nifi.apache.org/security.html#CVE-2018-17194
Пакеты
org.apache.nifi:nifi-framework-cluster
>= 1.0.0, <= 1.7.1
1.8.0
Связанные уязвимости
When a client request to a cluster node was replicated to other nodes in the cluster for verification, the Content-Length was forwarded. On a DELETE request, the body was ignored, but if the initial request had a Content-Length value other than 0, the receiving nodes would wait for the body and eventually timeout. Mitigation: The fix to check DELETE requests and overwrite non-zero Content-Length header values was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.