Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7mqj-xgf8-p59v

Опубликовано: 29 окт. 2024
Источник: github
Github: Прошло ревью
CVSS4: 5.1
CVSS3: 4.6

Описание

Apache NiFi Cross-site Scripting vulnerability

Apache NiFi 1.10.0 through 1.27.0 and 2.0.0-M1 through 2.0.0-M3 support a description field for Parameters in a Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session context of the authenticated user. Upgrading to Apache NiFi 1.28.0 or 2.0.0-M4 is the recommended mitigation.

Пакеты

Наименование

org.apache.nifi:nifi-web-ui

maven
Затронутые версииВерсия исправления

>= 1.10.0, < 1.28.0

1.28.0

Наименование

org.apache.nifi:nifi-web-ui

maven
Затронутые версииВерсия исправления

>= 2.0.0-M1, < 2.0.0-M4

2.0.0-M4

EPSS

Процентиль: 79%
0.01255
Низкий

5.1 Medium

CVSS4

4.6 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 4.6
nvd
больше 1 года назад

Apache NiFi 1.10.0 through 1.27.0 and 2.0.0-M1 through 2.0.0-M3 support a description field for Parameters in a Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session context of the authenticated user. Upgrading to Apache NiFi 1.28.0 or 2.0.0-M4 is the recommended mitigation.

EPSS

Процентиль: 79%
0.01255
Низкий

5.1 Medium

CVSS4

4.6 Medium

CVSS3

Дефекты

CWE-79