Description
The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the versions of Java, Jersey, and Apache that the NiFI instance uses.
Remediation
References
https://nifi.apache.org/security.html#CVE-2019-10080
https://www.oracle.com/security-alerts/cpuApr2021.html
https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E
Related Vulnerabilities
CVE-2011-5063 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2022-38666 Vulnerability in maven package io.jenkins.plugins:cavisson-ns-nd-integration
CVE-2016-3087 Vulnerability in maven package org.apache.struts:struts2-core
CVE-2016-3723 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2019-20503 Vulnerability in maven package org.webjars.npm:electron