org.apache.nifi:nifi-bootstrap@1.4.0 vulnerabilities
-
latest version
1.25.0
-
latest non vulnerable version
-
first published
9 years ago
-
latest version published
3 months ago
-
licenses detected
- [0.0.1-incubating,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.apache.nifi:nifi-bootstrap package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.apache.nifi:nifi-bootstrap is an easy to use, powerful, and reliable system to process and distribute data. Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. The notification service manager and various policy authorizer and user group provider objects allowed trusted administrators to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE). How to fix XML External Entity (XXE) Injection? Upgrade |
[1.0.0,1.12.0)
|
org.apache.nifi:nifi-bootstrap is an easy to use, powerful, and reliable system to process and distribute data. Affected versions of this package are vulnerable to Insecure Encryption. The NiFi UI and API were protected by mandating TLS v1.2, as well as listening connections established by processors like ListenHTTP, HandleHttpRequest, etc. However intracluster communication such as cluster request replication, Site-to-Site, and load balanced queues continued to support TLS v1.0 or v1.1. How to fix Insecure Encryption? Upgrade |
[1.2.0,1.12.0)
|