BIT-nifi-2020-9487

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/nifi/BIT-nifi-2020-9487.json
JSON Data
https://api.test.osv.dev/v1/vulns/BIT-nifi-2020-9487
Aliases
Published
2025-09-12T11:46:44.344Z
Modified
2025-09-15T07:43:37.966279Z
Summary
[none]
Details

In Apache NiFi 1.0.0 to 1.11.4, the NiFi download token (one-time password) mechanism used a fixed cache size and did not authenticate a request to create a download token, only when attempting to use the token to access the content. An unauthenticated user could repeatedly request download tokens, preventing legitimate users from requesting download tokens.

Database specific
{
    "cpes": [
        "cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*"
    ],
    "severity": "High"
}
References

Affected packages

Bitnami / nifi

Package

Name
nifi
Purl
pkg:bitnami/nifi

Severity

  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
1.0.0
Last affected
1.11.4