CVE-2024-45477: Apache NiFi Cross-site Scripting vulnerability
Apache NiFi 1.10.0 through 1.27.0 and 2.0.0-M1 through 2.0.0-M3 support a description field for Parameters in a Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session context of the authenticated user. Upgrading to Apache NiFi 1.28.0 or 2.0.0-M4 is the recommended mitigation.
References
- github.com/advisories/GHSA-7mqj-xgf8-p59v
- github.com/apache/nifi
- github.com/apache/nifi/blob/rel/nifi-1.27.0/nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-web/nifi-web-ui/src/main/webapp/js/nf/canvas/nf-parameter-contexts.js
- github.com/apache/nifi/commit/153c87a7daaeebea9b119066285b840ea4056e09
- github.com/apache/nifi/pull/9195
- issues.apache.org/jira/browse/NIFI-13675
- lists.apache.org/thread/shdv0tw9hggj7tx9pl7g93mgok2lwbj9
- nifi.apache.org/documentation/security/
- nvd.nist.gov/vuln/detail/CVE-2024-45477
Detect and mitigate CVE-2024-45477 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →