Описание
Apache NiFi Cross-site Scripting vulnerability
Apache NiFi 1.10.0 through 1.27.0 and 2.0.0-M1 through 2.0.0-M3 support a description field for Parameters in a Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session context of the authenticated user. Upgrading to Apache NiFi 1.28.0 or 2.0.0-M4 is the recommended mitigation.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2024-45477
- https://github.com/apache/nifi/pull/9195
- https://github.com/apache/nifi/commit/153c87a7daaeebea9b119066285b840ea4056e09
- https://github.com/apache/nifi/blob/rel/nifi-1.27.0/nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-web/nifi-web-ui/src/main/webapp/js/nf/canvas/nf-parameter-contexts.js#L2197
- https://issues.apache.org/jira/browse/NIFI-13675
- https://lists.apache.org/thread/shdv0tw9hggj7tx9pl7g93mgok2lwbj9
- https://nifi.apache.org/documentation/security/#CVE-2024-45477
Пакеты
org.apache.nifi:nifi-web-ui
>= 1.10.0, < 1.28.0
1.28.0
org.apache.nifi:nifi-web-ui
>= 2.0.0-M1, < 2.0.0-M4
2.0.0-M4
Связанные уязвимости
Apache NiFi 1.10.0 through 1.27.0 and 2.0.0-M1 through 2.0.0-M3 support a description field for Parameters in a Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session context of the authenticated user. Upgrading to Apache NiFi 1.28.0 or 2.0.0-M4 is the recommended mitigation.