CVE-2019-12421: Insufficient Session Expiration
(updated )
When using an authentication mechanism other than PKI, when the user clicks Log Out in NiFi versions 1.0.0 to 1.9.2, NiFi invalidates the authentication token on the client side but not on the server side. This permits the user’s client-side token to be used for up to 12 hours after logging out to make API requests to NiFi.
References
- github.com/advisories/GHSA-fmqw-vqh5-cwq9
- github.com/apache/nifi/commit/cf6f5172503ce438c6c22c334c9367f774db7b24
- github.com/apache/nifi/pull/3362
- lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E
- nifi.apache.org/security.html
- nvd.nist.gov/vuln/detail/CVE-2019-12421
Detect and mitigate CVE-2019-12421 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →