CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
27.2%
Apache NiFi 1.10.0 through 1.26.0 and 2.0.0-M1 through 2.0.0-M3 support a description field in the Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session context of the authenticated user. Upgrading to Apache NiFi 1.27.0 or 2.0.0-M4 is the recommended mitigation.
Vendor | Product | Version | CPE |
---|---|---|---|
apache | nifi | * | cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:* |
apache | nifi | 2.0.0 | cpe:2.3:a:apache:nifi:2.0.0:milestone1:*:*:*:*:*:* |
apache | nifi | 2.0.0 | cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc1:*:*:*:*:*:* |
apache | nifi | 2.0.0 | cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc2:*:*:*:*:*:* |
apache | nifi | 2.0.0 | cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc3:*:*:*:*:*:* |
apache | nifi | 2.0.0 | cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc4:*:*:*:*:*:* |
apache | nifi | 2.0.0 | cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc5:*:*:*:*:*:* |
apache | nifi | 2.0.0 | cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc6:*:*:*:*:*:* |
apache | nifi | 2.0.0 | cpe:2.3:a:apache:nifi:2.0.0:milestone2:*:*:*:*:*:* |
apache | nifi | 2.0.0 | cpe:2.3:a:apache:nifi:2.0.0:milestone2-rc1:*:*:*:*:*:* |
[
{
"defaultStatus": "unaffected",
"packageName": "org.apache.nifi:nifi-web-ui",
"product": "Apache NiFi",
"vendor": "Apache Software Foundation",
"versions": [
{
"lessThanOrEqual": "1.26.0",
"status": "affected",
"version": "1.10.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "2.0.0-M3",
"status": "affected",
"version": "2.0.0-M1",
"versionType": "semver"
}
]
}
]