org.apache.nifi:nifi-web-api@1.10.0 vulnerabilities

  • latest version

    2.4.0

  • latest non vulnerable version

  • first published

    10 years ago

  • latest version published

    1 months ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.nifi:nifi-web-api package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • L
    Missing Authorization

    org.apache.nifi:nifi-web-api is a system to process and distribute data.

    Affected versions of this package are vulnerable to Missing Authorization when creating new Process Groups. A user with permission to create Process Groups on an application using a component-based authorization policy can include references to unauthorized Controller Services or Parameter Providers. Clients can then download non-sensitive Parameter values from the new Process Groups.

    How to fix Missing Authorization?

    Upgrade org.apache.nifi:nifi-web-api to version 2.1.0 or higher.

    [1.10.0,2.1.0)
    • M
    Cross-site Scripting (XSS)

    org.apache.nifi:nifi-web-api is a system to process and distribute data.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Malicious scripts could be injected to the UI through action by an unaware authenticated user in Firefox. This vulnerability is not exploitable via other browsers.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.apache.nifi:nifi-web-api to version 1.11.0 or higher.

    [1.0.0,1.11.0)
    • M
    Information Exposure

    org.apache.nifi:nifi-web-api is a system to process and distribute data.

    Affected versions of this package are vulnerable to Information Exposure. The sensitive parameter parser would log parsed values for debugging purposes. This would expose literal values entered in a sensitive property when no parameter was present.

    How to fix Information Exposure?

    Upgrade org.apache.nifi:nifi-web-api to version 1.11.0 or higher.

    [1.0.0,1.11.0)