CVE-2018-17194

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-17194
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-17194.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-17194
Aliases
Published
2018-12-19T14:29:00Z
Modified
2024-09-03T02:06:42.279468Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

When a client request to a cluster node was replicated to other nodes in the cluster for verification, the Content-Length was forwarded. On a DELETE request, the body was ignored, but if the initial request had a Content-Length value other than 0, the receiving nodes would wait for the body and eventually timeout. Mitigation: The fix to check DELETE requests and overwrite non-zero Content-Length header values was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.

References

Affected packages

Git / github.com/apache/nifi

Affected ranges

Type
GIT
Repo
https://github.com/apache/nifi
Events

Affected versions

docker/nifi-1.*

docker/nifi-1.2.0

nifi-1.*

nifi-1.0.0-RC1
nifi-1.1.0-RC2
nifi-1.2.0-RC2
nifi-1.3.0-RC1
nifi-1.5.0-RC1
nifi-1.6.0-RC3
nifi-1.7.0-RC1
nifi-1.7.1-RC1

rel/nifi-1.*

rel/nifi-1.0.0
rel/nifi-1.1.0
rel/nifi-1.2.0
rel/nifi-1.3.0
rel/nifi-1.4.0
rel/nifi-1.5.0
rel/nifi-1.6.0
rel/nifi-1.7.0
rel/nifi-1.7.1