org.apache.nifi:nifi-bootstrap@1.11.4 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.nifi:nifi-bootstrap package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
XML External Entity (XXE) Injection

org.apache.nifi:nifi-bootstrap is an easy to use, powerful, and reliable system to process and distribute data.

Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. The notification service manager and various policy authorizer and user group provider objects allowed trusted administrators to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE).

How to fix XML External Entity (XXE) Injection?

Upgrade org.apache.nifi:nifi-bootstrap to version 1.12.0 or higher.

[1.0.0,1.12.0)
  • M
Insecure Encryption

org.apache.nifi:nifi-bootstrap is an easy to use, powerful, and reliable system to process and distribute data.

Affected versions of this package are vulnerable to Insecure Encryption. The NiFi UI and API were protected by mandating TLS v1.2, as well as listening connections established by processors like ListenHTTP, HandleHttpRequest, etc. However intracluster communication such as cluster request replication, Site-to-Site, and load balanced queues continued to support TLS v1.0 or v1.1.

How to fix Insecure Encryption?

Upgrade org.apache.nifi:nifi-bootstrap to version 1.12.0 or higher.

[1.2.0,1.12.0)