BIT-nifi-2023-36542

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/nifi/BIT-nifi-2023-36542.json
JSON Data
https://api.test.osv.dev/v1/vulns/BIT-nifi-2023-36542
Aliases
Published
2025-09-12T11:46:59.981Z
Modified
2025-09-15T07:43:35.934588Z
Summary
Apache NiFi: Potential Code Injection with Properties Referencing Remote Resources
Details

Apache NiFi 0.0.2 through 1.22.0 include Processors and Controller Services that support HTTP URL references for retrieving drivers, which allows an authenticated and authorized user to configure a location that enables custom code execution. The resolution introduces a new Required Permission for referencing remote resources, restricting configuration of these components to privileged users. The permission prevents unprivileged users from configuring Processors and Controller Services annotated with the new Reference Remote Resources restriction. Upgrading to Apache NiFi 1.23.0 is the recommended mitigation.

Database specific
{
    "severity": "High",
    "cpes": [
        "cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*"
    ]
}
References

Affected packages

Bitnami / nifi

Package

Name
nifi
Purl
pkg:bitnami/nifi

Severity

  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0.0.2
Last affected
1.22.0