org.apache.nifi:nifi@0.5.1 vulnerabilities

  • latest version

    2.1.0

  • latest non vulnerable version

  • first published

    9 years ago

  • latest version published

    19 days ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.nifi:nifi package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Arbitrary Code Injection

    Affected versions of this package are vulnerable to Arbitrary Code Injection when retrieving a driver via remote URI. Permissions are not sufficiently checked when allowing users to reference remote resources.

    How to fix Arbitrary Code Injection?

    Upgrade org.apache.nifi:nifi to version 1.23.0 or higher.

    [0.0.2-incubating,1.23.0)
    • H
    Host Header Injection

    org.apache.nifi:nifi is a system to process and distribute data.

    Affected versions of this package are vulnerable to Host Header Injection. A malicious host header in an incoming HTTP request could cause NiFi to load resources from an external server.

    How to fix Host Header Injection?

    Upgrade org.apache.nifi:nifi to version 1.5.0 or higher.

    [,1.5.0)
    • H
    Cross-site Scripting (XSS)

    org.apache.nifi:nifi is an easy to use, powerful, and reliable system to process and distribute data.

    Apache NiFi before 0.7.4 and 1.x before 1.3.0 need to establish the response header telling browsers to only allow framing with the same origin.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.apache.nifi:nifi to version 0.7.4 or higher.

    [,0.7.4)[1.0.0,1.3.0)
    • M
    Cross-site Scripting (XSS)

    org.apache.nifi:nifi is an easy to use, powerful, and reliable system to process and distribute data.

    In Apache NiFi before 0.7.4 and 1.x before 1.3.0, there are certain user input components in the UI which had been guarding for some forms of XSS issues but were insufficient.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.apache.nifi:nifi to version 0.7.4, 1.3.0 or higher.

    [,0.7.4)[1.0.0,1.3.0)