Description
In Apache NiFi 1.2.0 to 1.11.4, the NiFi UI and API were protected by mandating TLS v1.2, as well as listening connections established by processors like ListenHTTP, HandleHttpRequest, etc. However intracluster communication such as cluster request replication, Site-to-Site, and load balanced queues continued to support TLS v1.0 or v1.1.
Remediation
References
https://lists.apache.org/thread.html/r2d9c21f9ec35d66f2bb42f8abe876dabd786166b6284e9a33582c718%40%3Ccommits.nifi.apache.org%3E
https://lists.apache.org/thread.html/re48582efe2ac973f8cff55c8b346825cb491c71935e15ab2d61ef3bf%40%3Ccommits.nifi.apache.org%3E
https://nifi.apache.org/security#CVE-2020-9491
Related Vulnerabilities
CVE-2013-2067 Vulnerability in maven package org.apache.tomcat:catalina
CVE-2023-41329 Vulnerability in maven package org.wiremock:wiremock
CVE-2014-1403 Vulnerability in npm package easyxdm
CVE-2019-10448 Vulnerability in maven package jenkins.xtc:extensivetesting
CVE-2023-37952 Vulnerability in maven package com.mabl.integration.jenkins:mabl-integration