Description
The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the versions of Java, Jersey, and Apache that the NiFI instance uses.
Remediation
References
https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E
https://nifi.apache.org/security.html#CVE-2019-10080
https://www.oracle.com/security-alerts/cpuApr2021.html
Related Vulnerabilities
CVE-2018-1196 Vulnerability in maven package org.springframework.boot:spring-boot-loader-tools
CVE-2023-32688 Vulnerability in npm package @parse/push-adapter
CVE-2021-27850 Vulnerability in maven package org.apache.tapestry:tapestry-core
CVE-2021-36163 Vulnerability in maven package org.apache.dubbo:dubbo-serialization
CVE-2020-2212 Vulnerability in maven package org.jenkins-ci.plugins:github-coverage-reporter