Description
The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the versions of Java, Jersey, and Apache that the NiFI instance uses.
Remediation
References
https://nifi.apache.org/security.html#CVE-2019-10080
https://www.oracle.com/security-alerts/cpuApr2021.html
https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E
Related Vulnerabilities
CVE-2020-8203 Vulnerability in maven package org.webjars:lodash
CVE-2017-3165 Vulnerability in maven package org.apache.brooklyn:brooklyn-jsgui
CVE-2022-34193 Vulnerability in maven package org.lilicurroad.jenkins:packageversion
CVE-2020-1744 Vulnerability in maven package org.keycloak:keycloak-services
CVE-2016-0712 Vulnerability in maven package org.apache.portals.jetspeed-2:jetspeed-portal