CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
27.2%
SSVC
Exploitation
none
Automatable
no
Technical Impact
partial
Apache NiFi 1.10.0 through 1.26.0 and 2.0.0-M1 through 2.0.0-M3 support a description field in the Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session context of the authenticated user. Upgrading to Apache NiFi 1.27.0 or 2.0.0-M4 is the recommended mitigation.
[
{
"vendor": "Apache Software Foundation",
"product": "Apache NiFi",
"versions": [
{
"status": "affected",
"version": "1.10.0",
"versionType": "semver",
"lessThanOrEqual": "1.26.0"
},
{
"status": "affected",
"version": "2.0.0-M1",
"versionType": "semver",
"lessThanOrEqual": "2.0.0-M3"
}
],
"packageName": "org.apache.nifi:nifi-web-ui",
"defaultStatus": "unaffected"
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
27.2%
SSVC
Exploitation
none
Automatable
no
Technical Impact
partial