Skip to content

Cleartext Transmission of Sensitive Information in Apache nifi

High severity GitHub Reviewed Published Dec 20, 2018 to the GitHub Advisory Database • Updated Mar 4, 2024

Package

maven org.apache.nifi:nifi (Maven)

Affected versions

>= 1.0.0, <= 1.7.1

Patched versions

1.8.0

Description

The template upload API endpoint accepted requests from different domain when sent in conjunction with ARP spoofing + man in the middle (MiTM) attack, resulting in a CSRF attack. The required attack vector is complex, requiring a scenario with client certificate authentication, same subnet access, and injecting malicious code into an unprotected (plaintext HTTP) website which the targeted user later visits, but the possible damage warranted a Severe severity level. Mitigation: The fix to apply Cross-Origin Resource Sharing (CORS) policy request filtering was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.

References

Published to the GitHub Advisory Database Dec 20, 2018
Reviewed Jun 16, 2020
Last updated Mar 4, 2024

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE ID

CVE-2018-17195

GHSA ID

GHSA-3jq8-jg75-rqv6

Source code

No known source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.