CVE-2023-22832

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-22832
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-22832.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-22832
Aliases
Published
2023-02-10T08:15:12Z
Modified
2024-10-12T10:41:23.134603Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

The ExtractCCDAAttributes Processor in Apache NiFi 1.2.0 through 1.19.1 does not restrict XML External Entity references.

Flow configurations that include the ExtractCCDAAttributes Processor are vulnerable to malicious XML documents that contain Document Type Declarations with XML External Entity references.

The resolution disables Document Type Declarations and disallows XML External Entity resolution in the ExtractCCDAAttributes Processor.

References

Affected packages

Git / github.com/apache/nifi

Affected ranges

Type
GIT
Repo
https://github.com/apache/nifi
Events

Affected versions

nifi-1.*

nifi-1.10.0-RC3
nifi-1.11.0-RC3
nifi-1.12.0-RC1
nifi-1.14.0-RC2
nifi-1.15.0-RC3
nifi-1.16.0-RC3
nifi-1.17.0-RC2
nifi-1.18.0-RC4
nifi-1.19.0-RC1
nifi-1.19.1-RC1
nifi-1.19.1-RC2
nifi-1.2.0-RC2
nifi-1.3.0-RC1
nifi-1.5.0-RC1
nifi-1.6.0-RC3
nifi-1.7.0-RC1
nifi-1.8.0-RC3
nifi-1.9.0-RC2

rel/nifi-1.*

rel/nifi-1.10.0
rel/nifi-1.11.0
rel/nifi-1.12.0
rel/nifi-1.14.0
rel/nifi-1.15.0
rel/nifi-1.16.0
rel/nifi-1.17.0
rel/nifi-1.18.0
rel/nifi-1.19.0
rel/nifi-1.19.1
rel/nifi-1.2.0
rel/nifi-1.3.0
rel/nifi-1.4.0
rel/nifi-1.5.0
rel/nifi-1.6.0
rel/nifi-1.7.0
rel/nifi-1.8.0
rel/nifi-1.9.0