GHSA-v4p2-2w39-mhrj

Suggest an improvement
Source
https://github.com/advisories/GHSA-v4p2-2w39-mhrj
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/12/GHSA-v4p2-2w39-mhrj/GHSA-v4p2-2w39-mhrj.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-v4p2-2w39-mhrj
Aliases
Published
2025-12-19T12:31:24Z
Modified
2025-12-23T15:56:41.802470Z
Severity
  • 7.5 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/AU:Y/R:U/V:C/RE:L/U:Green CVSS Calculator
Summary
Apache NiFi GetAsanaObject Processor has Remote Code Execution via Unsafe Deserialization
Details

Apache NiFi 1.20.0 through 2.6.0 include the GetAsanaObject Processor, which requires integration with a configurable Distribute Map Cache Client Service for storing and retrieving state information. The GetAsanaObject Processor used generic Java Object serialization and deserialization without filtering. Unfiltered Java object deserialization does not provide protection against crafted state information stored in the cache server configured for GetAsanaObject. Exploitation requires an Apache NiFi system running with the GetAsanaObject Processor, and direct access to the configured cache server. Upgrading to Apache NiFi 2.7.0 is the recommended mitigation, which replaces Java Object serialization with JSON serialization. Removing the GetAsanaObject Processor located in the nifi-asana-processors-nar bundle also prevents exploitation.

Database specific
{
    "nvd_published_at": "2025-12-19T10:15:48Z",
    "cwe_ids": [
        "CWE-502"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2025-12-19T21:45:09Z"
}
References

Affected packages

Maven / org.apache.nifi:nifi-asana-processors

Package

Name
org.apache.nifi:nifi-asana-processors
View open source insights on deps.dev
Purl
pkg:maven/org.apache.nifi/nifi-asana-processors

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.20.0
Fixed
2.7.0

Affected versions

1.*

1.20.0
1.21.0
1.22.0
1.23.0
1.23.1
1.23.2
1.24.0
1.25.0
1.26.0
1.27.0
1.28.0
1.28.1

2.*

2.0.0-M1
2.0.0-M2
2.0.0-M3
2.0.0-M4
2.0.0
2.1.0
2.2.0
2.3.0
2.4.0
2.5.0
2.6.0