Skip to content

Apache NiFi Insufficient Property Validation vulnerability

Moderate severity GitHub Reviewed Published Aug 19, 2023 to the GitHub Advisory Database • Updated Nov 8, 2023

Package

maven org.apache.nifi:nifi-dbcp-base (Maven)

Affected versions

>= 1.21.0, < 1.23.1

Patched versions

1.23.1
maven org.apache.nifi:nifi-dbcp-service-api (Maven)
>= 1.21.0, < 1.23.1
1.23.1
maven org.apache.nifi:nifi-dbcp-service-bundle (Maven)
>= 1.21.0, < 1.23.1
1.23.1
maven org.apache.nifi:nifi-jms-processors (Maven)
>= 1.21.0, < 1.23.1
1.23.1

Description

Apache NiFi 1.21.0 through 1.23.0 support JDBC and JNDI JMS access in several Processors and Controller Services with connection URL validation that does not provide sufficient protection against crafted inputs. An authenticated and authorized user can bypass connection URL validation using custom input formatting. The resolution enhances connection URL validation and introduces validation for additional related properties. Upgrading to Apache NiFi 1.23.1 is the recommended mitigation.

References

Published by the National Vulnerability Database Aug 18, 2023
Published to the GitHub Advisory Database Aug 19, 2023
Reviewed Aug 21, 2023
Last updated Nov 8, 2023

Severity

Moderate
6.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

CVE ID

CVE-2023-40037

GHSA ID

GHSA-23qf-3jf9-h3q9

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.