Description
The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution. The resolution validates the Database URL and rejects H2 JDBC locations. You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
Remediation
References
http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html
http://www.openwall.com/lists/oss-security/2023/06/12/3
https://lists.apache.org/thread/7b82l4f5blmpkfcynf3y6z4x1vqo59h8
https://nifi.apache.org/security.html#CVE-2023-34468
https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation/
Related Vulnerabilities
CVE-2021-32696 Vulnerability in npm package striptags
CVE-2020-28426 Vulnerability in npm package kill-process-on-port
CVE-2019-10908 Vulnerability in maven package org.airsonic.player:airsonic-main
CVE-2020-15138 Vulnerability in maven package org.webjars.npm:prismjs
CVE-2020-21122 Vulnerability in maven package com.bstek.ureport:ureport2-console