Information Exposure Affecting org.apache.nifi:nifi-web-security package, versions [,1.11.1)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.14% (50th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGAPACHENIFI-548595
  • published12 Feb 2020
  • disclosed11 Feb 2020
  • creditAndy LoPresto

Introduced: 11 Feb 2020

CVE-2020-1942  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade org.apache.nifi:nifi-web-security to version 1.11.1 or higher.

Overview

org.apache.nifi:nifi-web-security is a system to process and distribute data.

Affected versions of this package are vulnerable to Information Exposure. The flow fingerprint factory generated flow fingerprints which included sensitive property descriptor values. In the event a node attempted to join a cluster and the cluster flow was not inheritable, the flow fingerprint of both the cluster and local flow was printed, potentially containing sensitive values in plaintext.

CVSS Scores

version 3.1