Cryptographic Issues Affecting org.apache.nifi:nifi-security-utils package, versions [0,1.14.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cryptographic Issues vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHENIFI-1079239
  • published17 May 2021
  • disclosed9 Apr 2021
  • creditUnknown

Introduced: 9 Apr 2021

CVE NOT AVAILABLE CWE-310  (opens in a new tab)

How to fix?

Upgrade org.apache.nifi:nifi-security-utils to version 1.14.0 or higher.

Overview

org.apache.nifi:nifi-security-utils is a system to process and distribute data.

Affected versions of this package are vulnerable to Cryptographic Issues. NiFi accepts a password and encryption algorithm in {{nifi.properties}} which are used to encrypt all sensitive processor properties throughout the application. The password defaults to empty and the algorithm defaults to {{PBEWITHMD5AND256BITAES-CBC-OPENSSL}}. This algorithm:

  • uses a digest function ({{MD5}}) which is not cryptographically secure [1][2][3][4]
  • uses a single iteration count [5][6]
  • limits password input to 16 characters on JVMs without the unlimited strength cryptographic jurisdiction policy files installed [NIFI-1255]

This is considered insecure practice.

CVSS Scores

version 3.1