CVE-2022-33140

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-33140
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-33140.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-33140
Aliases
Published
2022-06-15T15:15:08Z
Modified
2025-01-14T11:02:09.138703Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration. Command injection requires ShellUserGroupProvider to be one of the enabled User Group Providers in the Authorizers configuration. Command injection also requires an authenticated user with elevated privileges. Apache NiFi requires an authenticated user with authorization to modify access policies in order to execute the command. Apache NiFi Registry requires an authenticated user with authorization to read user groups in order to execute the command. The resolution removes command formatting based on user-provided arguments.

References

Affected packages

Git / github.com/apache/nifi

Affected ranges

Affected versions

docker/nifi-1.*

docker/nifi-1.2.0

nifi-0.*

nifi-0.6.0
nifi-0.6.0-RC2

nifi-1.*

nifi-1.0.0-RC1
nifi-1.1.0-RC2
nifi-1.10.0-RC3
nifi-1.11.0-RC3
nifi-1.12.0-RC1
nifi-1.14.0-RC2
nifi-1.15.0-RC3
nifi-1.16.0-RC3
nifi-1.16.1-RC1
nifi-1.16.2-RC3
nifi-1.2.0-RC2
nifi-1.3.0-RC1
nifi-1.5.0-RC1
nifi-1.6.0-RC3
nifi-1.7.0-RC1
nifi-1.8.0-RC3
nifi-1.9.0-RC2

rel/nifi-1.*

rel/nifi-1.0.0
rel/nifi-1.1.0
rel/nifi-1.10.0
rel/nifi-1.11.0
rel/nifi-1.12.0
rel/nifi-1.14.0
rel/nifi-1.15.0
rel/nifi-1.16.0
rel/nifi-1.16.1
rel/nifi-1.16.2
rel/nifi-1.2.0
rel/nifi-1.3.0
rel/nifi-1.4.0
rel/nifi-1.5.0
rel/nifi-1.6.0
rel/nifi-1.7.0
rel/nifi-1.8.0
rel/nifi-1.9.0