Description
The ExtractCCDAAttributes Processor in Apache NiFi 1.2.0 through 1.19.1 does not restrict XML External Entity references. Flow configurations that include the ExtractCCDAAttributes Processor are vulnerable to malicious XML documents that contain Document Type Declarations with XML External Entity references. The resolution disables Document Type Declarations and disallows XML External Entity resolution in the ExtractCCDAAttributes Processor.
Remediation
References
https://lists.apache.org/thread/b51qs6y7b7r58vovddkv6wc16g2xbl3w
https://nifi.apache.org/security.html#CVE-2023-22832
Related Vulnerabilities
CVE-2015-2582 Vulnerability in maven package org.keycloak:keycloak-saml-core
CVE-2023-35887 Vulnerability in maven package org.apache.sshd:sshd-common
CVE-2023-40167 Vulnerability in maven package org.eclipse.jetty:jetty-http
CVE-2020-13943 Vulnerability in maven package org.apache.tomcat:tomcat-coyote
CVE-2023-34036 Vulnerability in maven package org.springframework.hateoas:spring-hateoas