Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.apache.nifi/nifi-jms-processors@1.11.1
purl pkg:maven/org.apache.nifi/nifi-jms-processors@1.11.1
Next non-vulnerable version 1.23.1
Latest non-vulnerable version 1.23.1
Risk 4.0
Vulnerabilities affecting this package (2)
Vulnerability Summary Fixed by
VCID-4uja-72yx-6qdc
Aliases:
CVE-2023-34212
GHSA-65wh-g8x8-gm2h
Deserialization of Untrusted Data The JndiJmsConnectionFactoryProvider Controller Service, along with the ConsumeJMS and PublishJMS Processors, in Apache NiFi 1.8.0 through 1.21.0 allow an authenticated and authorized user to configure URL and library properties that enable deserialization of untrusted data from a remote location. The resolution validates the JNDI URL and restricts locations to a set of allowed schemes. You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
1.22.0
Affected by 2 other vulnerabilities.
VCID-rv8f-q4a4-xqbk
Aliases:
CVE-2023-36542
GHSA-r969-8v3h-23v9
Apache NiFi Code Injection vulnerability Apache NiFi 0.0.2 through 1.22.0 include Processors and Controller Services that support HTTP URL references for retrieving drivers, which allows an authenticated and authorized user to configure a location that enables custom code execution. The resolution introduces a new Required Permission for referencing remote resources, restricting configuration of these components to privileged users. The permission prevents unprivileged users from configuring Processors and Controller Services annotated with the new Reference Remote Resources restriction. Upgrading to Apache NiFi 1.23.0 is the recommended mitigation.
1.23.0
Affected by 1 other vulnerability.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.