Description
The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution. The resolution validates the Database URL and rejects H2 JDBC locations. You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
Remediation
References
https://nifi.apache.org/security.html#CVE-2023-34468
https://lists.apache.org/thread/7b82l4f5blmpkfcynf3y6z4x1vqo59h8
http://www.openwall.com/lists/oss-security/2023/06/12/3
http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html
https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation/
Related Vulnerabilities
CVE-2022-23496 Vulnerability in maven package nl.basjes.parse.useragent:yauaa-snowflake
CVE-2021-24122 Vulnerability in maven package org.apache.tomcat:tomcat-catalina
CVE-2015-0886 Vulnerability in maven package org.mindrot:jbcrypt
CVE-2020-36144 Vulnerability in npm package redash
CVE-2022-21718 Vulnerability in maven package org.webjars.npm:electron