Description
The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution. The resolution validates the Database URL and rejects H2 JDBC locations. You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
Remediation
References
https://nifi.apache.org/security.html#CVE-2023-34468
https://lists.apache.org/thread/7b82l4f5blmpkfcynf3y6z4x1vqo59h8
http://www.openwall.com/lists/oss-security/2023/06/12/3
http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html
https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation/
Related Vulnerabilities
CVE-2022-43424 Vulnerability in maven package com.compuware.jenkins:compuware-xpediter-code-coverage
CVE-2021-44550 Vulnerability in maven package edu.stanford.nlp:stanford-corenlp
CVE-2012-0394 Vulnerability in maven package org.apache.struts.xwork:xwork-core
CVE-2020-11972 Vulnerability in maven package org.apache.camel:camel-rabbitmq
CVE-2020-5408 Vulnerability in maven package org.springframework.security:spring-security-core