GHSA-rcwj-2hj2-vmjj

Suggest an improvement
Source
https://github.com/advisories/GHSA-rcwj-2hj2-vmjj
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-rcwj-2hj2-vmjj/GHSA-rcwj-2hj2-vmjj.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-rcwj-2hj2-vmjj
Aliases
  • CVE-2020-9482
Published
2022-02-09T00:23:06Z
Modified
2024-02-16T08:12:03.316029Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
Insufficient Session Expiration in Apache NiFi Registry
Details

If NiFi Registry 0.1.0 to 0.5.0 uses an authentication mechanism other than PKI, when the user clicks Log Out, NiFi Registry invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to NiFi Registry.

Database specific
{
    "nvd_published_at": "2020-04-28T19:15:00Z",
    "cwe_ids": [
        "CWE-613"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2021-03-29T18:36:05Z"
}
References

Affected packages

Maven / org.apache.nifi.registry:nifi-registry-web-api

Package

Name
org.apache.nifi.registry:nifi-registry-web-api
View open source insights on deps.dev
Purl
pkg:maven/org.apache.nifi.registry/nifi-registry-web-api

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0.1.0
Fixed
0.7.0

Affected versions

0.*

0.1.0
0.2.0
0.3.0
0.4.0
0.5.0

Database specific

{
    "last_known_affected_version_range": "<= 0.5.0"
}