Description
Apache NiFi 0.0.2 through 1.22.0 include Processors and Controller Services that support HTTP URL references for retrieving drivers, which allows an authenticated and authorized user to configure a location that enables custom code execution. The resolution introduces a new Required Permission for referencing remote resources, restricting configuration of these components to privileged users. The permission prevents unprivileged users from configuring Processors and Controller Services annotated with the new Reference Remote Resources restriction. Upgrading to Apache NiFi 1.23.0 is the recommended mitigation.
Remediation
References
https://lists.apache.org/thread/swnly3dzhhq9zo3rofc8djq77stkhbof
https://nifi.apache.org/security.html#CVE-2023-36542
http://www.openwall.com/lists/oss-security/2023/07/29/1
http://seclists.org/fulldisclosure/2023/Jul/43
Related Vulnerabilities
CVE-2023-28709 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2023-6927 Vulnerability in maven package org.keycloak:keycloak-services
CVE-2023-36665 Vulnerability in maven package org.webjars.npm:protobufjs
CVE-2021-21346 Vulnerability in maven package com.thoughtworks.xstream:xstream
CVE-2021-35513 Vulnerability in maven package org.webjars.bower:mermaid