Search for packages
| purl | pkg:maven/org.apache.nifi/nifi-web-security@1.10.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-cg2v-phw4-ake2
Aliases: CVE-2020-9487 GHSA-3pp3-77j6-8ph6 |
Missing Authentication for Critical Function in Apache NiFi In Apache NiFi 1.0.0 to 1.11.4, the NiFi download token (one-time password) mechanism used a fixed cache size and did not authenticate a request to create a download token, only when attempting to use the token to access the content. An unauthenticated user could repeatedly request download tokens, preventing legitimate users from requesting download tokens. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-mrb8-sr51-vkep | Apache NiFi user log out issue When using an authentication mechanism other than PKI, when the user clicks Log Out in NiFi versions 1.0.0 to 1.9.2, NiFi invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to NiFi. |
CVE-2019-12421
GHSA-fmqw-vqh5-cwq9 |