CVE-2024-37389

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-37389
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-37389.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-37389
Aliases
Related
Published
2024-07-08T08:15:10Z
Modified
2024-10-08T04:15:32.012285Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Apache NiFi 1.10.0 through 1.26.0 and 2.0.0-M1 through 2.0.0-M3 support a description field in the Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session context of the authenticated user. Upgrading to Apache NiFi 1.27.0 or 2.0.0-M4 is the recommended mitigation.

References

Affected packages

Git / github.com/apache/nifi

Affected ranges

Type
GIT
Repo
https://github.com/apache/nifi
Events

Affected versions

nifi-1.*

nifi-1.10.0-RC3
nifi-1.11.0-RC3
nifi-1.12.0-RC1
nifi-1.14.0-RC2
nifi-1.15.0-RC3
nifi-1.16.0-RC3
nifi-1.17.0-RC2
nifi-1.18.0-RC4
nifi-1.19.0-RC1
nifi-1.20.0-RC1
nifi-1.21.0-RC2
nifi-1.22.0-RC1
nifi-1.23.0-RC3
nifi-1.24.0-RC5
nifi-1.25.0-RC1
nifi-1.26.0-RC1

rel/nifi-1.*

rel/nifi-1.10.0
rel/nifi-1.11.0
rel/nifi-1.12.0
rel/nifi-1.14.0
rel/nifi-1.15.0
rel/nifi-1.16.0
rel/nifi-1.17.0
rel/nifi-1.18.0
rel/nifi-1.19.0
rel/nifi-1.20.0
rel/nifi-1.21.0
rel/nifi-1.22.0
rel/nifi-1.23.0
rel/nifi-1.24.0
rel/nifi-1.25.0
rel/nifi-1.26.0