CVE-2023-34212: Apache NiFi vulnerable to Deserialization of Untrusted Data
(updated )
The JndiJmsConnectionFactoryProvider Controller Service, along with the ConsumeJMS and PublishJMS Processors, in Apache NiFi 1.8.0 through 1.21.0 allow an authenticated and authorized user to configure URL and library properties that enable deserialization of untrusted data from a remote location.
The resolution validates the JNDI URL and restricts locations to a set of allowed schemes.
You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
References
- github.com/advisories/GHSA-65wh-g8x8-gm2h
- github.com/apache/nifi
- github.com/apache/nifi/commit/3fcb82ee4509d1ad73893d8dca003be6d086c5d6
- github.com/apache/nifi/pull/7313
- issues.apache.org/jira/browse/NIFI-11614
- lists.apache.org/thread/w5rm46fxmvxy216tglf0dv83wo6gnzr5
- nifi.apache.org/security.html
- nvd.nist.gov/vuln/detail/CVE-2023-34212
Detect and mitigate CVE-2023-34212 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →