CVE-2024-45477

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-45477
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-45477.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-45477
Aliases
Published
2024-10-29T09:15:07Z
Modified
2025-01-14T12:16:49.615012Z
Severity
  • 4.6 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Apache NiFi 1.10.0 through 1.27.0 and 2.0.0-M1 through 2.0.0-M3 support a description field for Parameters in a Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session context of the authenticated user. Upgrading to Apache NiFi 1.28.0 or 2.0.0-M4 is the recommended mitigation.

References

Affected packages

Git / github.com/apache/nifi

Affected versions

nifi-1.*

nifi-1.10.0-RC3
nifi-1.11.0-RC3
nifi-1.12.0-RC1
nifi-1.14.0-RC2
nifi-1.15.0-RC3
nifi-1.16.0-RC3
nifi-1.17.0-RC2
nifi-1.18.0-RC4
nifi-1.19.0-RC1
nifi-1.20.0-RC1
nifi-1.21.0-RC2
nifi-1.22.0-RC1
nifi-1.23.0-RC3
nifi-1.24.0-RC5
nifi-1.25.0-RC1
nifi-1.26.0-RC1
nifi-1.27.0-RC2

nifi-2.*

nifi-2.0.0-M1-RC6

rel/nifi-1.*

rel/nifi-1.10.0
rel/nifi-1.11.0
rel/nifi-1.12.0
rel/nifi-1.14.0
rel/nifi-1.15.0
rel/nifi-1.16.0
rel/nifi-1.17.0
rel/nifi-1.18.0
rel/nifi-1.19.0
rel/nifi-1.20.0
rel/nifi-1.21.0
rel/nifi-1.22.0
rel/nifi-1.23.0
rel/nifi-1.24.0
rel/nifi-1.25.0
rel/nifi-1.26.0
rel/nifi-1.27.0

rel/nifi-2.*

rel/nifi-2.0.0-M1