org.apache.nifi:nifi-framework@1.9.1 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.nifi:nifi-framework package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Insecure Encryption

org.apache.nifi:nifi-framework is a system to process and distribute data.

Affected versions of this package are vulnerable to Insecure Encryption. A few NiFi framework classes use the MD5 algorithm for determining whether file contents have changed. This algorithm is known for having several security issues.

How to fix Insecure Encryption?

Upgrade org.apache.nifi:nifi-framework to version 1.14.0 or higher.

(,1.14.0)
  • H
Information Exposure

org.apache.nifi:nifi-framework is a system to process and distribute data.

Affected versions of this package are vulnerable to Information Exposure. The flow fingerprint factory generated flow fingerprints which included sensitive property descriptor values. In the event a node attempted to join a cluster and the cluster flow was not inheritable, the flow fingerprint of both the cluster and local flow was printed, potentially containing sensitive values in plaintext.

How to fix Information Exposure?

Upgrade org.apache.nifi:nifi-framework to version 1.11.1 or higher.

(,1.11.1)
  • M
Information Exposure

org.apache.nifi:nifi-framework is a system to process and distribute data.

Affected versions of this package are vulnerable to Information Exposure. When updating a Process Group via the API, the response to the request includes all of its contents (at the top most level, not recursively). The response included details about processors and controller services which the user may not have had read access to.

How to fix Information Exposure?

Upgrade org.apache.nifi:nifi-framework to version 1.10.0 or higher.

[1.3.0,1.10.0)
  • C
Session Fixation

org.apache.nifi:nifi-framework is a system to process and distribute data.

Affected versions of this package are vulnerable to Session Fixation. When using an authentication mechanism other than PKI, when the user clicks Log Out, NiFi invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to NiFi.

How to fix Session Fixation?

Upgrade org.apache.nifi:nifi-framework to version 1.10.0 or higher.

[1.0.0,1.10.0)