Description
The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the versions of Java, Jersey, and Apache that the NiFI instance uses.
Remediation
References
https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E
https://nifi.apache.org/security.html#CVE-2019-10080
https://www.oracle.com/security-alerts/cpuApr2021.html
Related Vulnerabilities
CVE-2023-50774 Vulnerability in maven package org.jenkins-ci.plugins:htmlresource
CVE-2023-6394 Vulnerability in maven package io.quarkus:quarkus-smallrye-graphql-deployment
CVE-2019-20174 Vulnerability in maven package org.webjars.npm:auth0-lock
CVE-2022-25205 Vulnerability in maven package org.jenkins-ci.plugins:dbcharts
CVE-2017-2608 Vulnerability in maven package org.jenkins-ci.main:jenkins-core