Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS02OHByLTZmamMtd21nbc4AA3Yo
Improper Neutralization of Input in Advanced User Interface for Jolt
Apache NiFi 0.7.0 through 1.23.2 include the JoltTransformJSON Processor, which provides an advanced configuration user interface that is vulnerable to DOM-based cross-site scripting. If an authenticated user, who is authorized to configure a JoltTransformJSON Processor, visits a crafted URL, then arbitrary JavaScript code can be executed within the session context of the authenticated user. Upgrading to Apache NiFi 1.24.0 or 2.0.0-M1 is the recommended mitigation.
Permalink: https://github.com/advisories/GHSA-68pr-6fjc-wmgmJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS02OHByLTZmamMtd21nbc4AA3Yo
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 6 months ago
Updated: 6 months ago
CVSS Score: 7.9
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
Identifiers: GHSA-68pr-6fjc-wmgm, CVE-2023-49145
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-49145
- https://lists.apache.org/thread/j8rd0qsvgoj0khqck5f49jfbp0fm8r1o
- https://nifi.apache.org/security.html#CVE-2023-49145
- https://github.com/apache/nifi/pull/8060
- https://github.com/apache/nifi/commit/50efc55df6bb00ea15adcc2459d5cc82d128857f
- https://issues.apache.org/jira/browse/NIFI-12403
- http://www.openwall.com/lists/oss-security/2023/11/27/5
- https://github.com/advisories/GHSA-68pr-6fjc-wmgm
Blast Radius: 14.4
Affected Packages
maven:org.apache.nifi:nifi-jolt-transform-json-ui
Dependent packages: 2Dependent repositories: 67
Downloads:
Affected Version Ranges: < 1.24.0
Fixed in: 1.24.0
All affected versions: 0.7.0, 0.7.1, 0.7.2, 0.7.3, 0.7.4, 1.0.0, 1.0.1, 1.1.0, 1.1.1, 1.1.2, 1.2.0, 1.3.0, 1.4.0, 1.5.0, 1.6.0, 1.7.0, 1.7.1, 1.8.0, 1.9.0, 1.9.1, 1.9.2, 1.10.0, 1.11.0, 1.11.1, 1.11.2, 1.11.3, 1.11.4, 1.12.0, 1.12.1, 1.13.0, 1.13.1, 1.13.2, 1.14.0, 1.15.0, 1.15.1, 1.15.2, 1.15.3, 1.16.0, 1.16.1, 1.16.2, 1.16.3, 1.17.0, 1.18.0, 1.19.0, 1.19.1, 1.20.0, 1.21.0, 1.22.0, 1.23.0, 1.23.1, 1.23.2
All unaffected versions: 1.24.0, 1.25.0