Modified: nifi/site/trunk/people.html
URL: 
http://svn.apache.org/viewvc/nifi/site/trunk/people.html?rev=1785781&r1=1785780&r2=1785781&view=diff
==============================================================================
--- nifi/site/trunk/people.html (original)
+++ nifi/site/trunk/people.html Mon Mar  6 23:14:44 2017
@@ -218,6 +218,11 @@
        <td>Joe Skora</td>
        <td></td>
     </tr>
+    <tr>
+        <td>jwing</td>
+        <td>James Wing</td>
+        <td></td>
+    </tr>
 </table>
 </div>
 </div>
@@ -292,11 +297,6 @@
         <td>Joey Frazee</td>
         <td></td>
     </tr>
-    <tr>
-        <td>jwing</td>
-        <td>James Wing</td>
-        <td></td>
-    </tr>
 </table>
 </div>
 </div>

Modified: nifi/site/trunk/powered-by-nifi.html
URL: 
http://svn.apache.org/viewvc/nifi/site/trunk/powered-by-nifi.html?rev=1785781&r1=1785780&r2=1785781&view=diff
==============================================================================
--- nifi/site/trunk/powered-by-nifi.html (original)
+++ nifi/site/trunk/powered-by-nifi.html Mon Mar  6 23:14:44 2017
@@ -166,17 +166,17 @@
                 <td>GoDataDriven, a Dutch service company in the data science 
and engineering space, helps customers ingest and process data in real time 
from the most disparate devices (including but not limited to trains!).</td>
             </tr>
             <tr>
-                <td><a href="https://looker.com";>Looker</td>
+                <td><a href="https://looker.com";>Looker</a></td>
                 <td>SaaS & Analytics Software</td>
                 <td>We're building all new data ingestion pipelines using 
NiFi. Existing pipelines are being migrated to NiFi as well. We have deployed 
NiFi clusters to ingest, transform, and deliver data to various backends like 
Google Big Query, Amazon Redshift, and Amazon S3.</td>
             </tr>
             <tr>
-               <td><a href="https://www.thinkbiganalytics.com";>Think Big, A 
Teradata Company</td>
+               <td><a href="https://www.thinkbiganalytics.com";>Think Big, A 
Teradata Company</a></td>
                <td>Data Science & Engineering</td>
                <td>Think Big's open-source data lake management platform <a 
href="http://kylo.io";>Kylo</a> offers a turn-key, enterprise-ready data lake 
solution that integrates best practices around metadata management, governance, 
and security gleaned from Think Big's 150+ big data implementation projects. 
Kylo uses Apache NiFi as the underlying scheduler and orchestration engine, 
along with other technologies like Apache Hadoop and Apache Spark.</td>
             </tr>
             <tr>
-                <td><a href="http://www.hashmapinc.com/";>Hashmap, Inc.</td>
+                <td><a href="http://www.hashmapinc.com/";>Hashmap, Inc.</a></td>
                 <td>Big Data / IoT</td>
                 <td>Hashmap uses Apache NiFi to securely collect, transmit, 
and transform data for ingest and delivery into our IoT / Time Series 
Accelerator platform, allowing for outcome-based, real time analytics and 
visualization of oil & gas, utilities, manufacturing, industrial, retail, 
pharma, and process control data. Additionally, we are creating a catalog of 
open source, ready-to-run, industry specific NiFi processors and controller 
services for protocols like OPC-UA, ETP, WITSML, LAS, and many others.</td>
             </tr>

Modified: nifi/site/trunk/security.html
URL: 
http://svn.apache.org/viewvc/nifi/site/trunk/security.html?rev=1785781&r1=1785780&r2=1785781&view=diff
==============================================================================
--- nifi/site/trunk/security.html (original)
+++ nifi/site/trunk/security.html Mon Mar  6 23:14:44 2017
@@ -106,6 +106,48 @@
 <div class="medium-space"></div>
 <div class="row">
     <div class="large-12 columns features">
+        <h2>Fixed in Apache NiFi 0.7.2 and 1.1.2</h2>
+    </div>
+</div>
+<div class="row">
+        <div class="large-12 columns">
+            <p><b>CVE-2107-5635</b>: Apache NiFi Unauthorized Data Access In 
Cluster Environment</p>
+            <p>Severity: <b>Important</b></p>
+            <p>Versions Affected:</p>
+    <ul>
+      <li>Apache NiFi 0.7.0</li>
+      <li>Apache NiFi 0.7.1</li>
+      <li>Apache NiFi 1.1.0</li>
+      <li>Apache NiFi 1.1.1</li>
+    </ul>
+      </p>
+      <p>Description: In a cluster environment, if an anonymous user request 
is replicated to another node, the originating node identity is used rather 
than the “anonymous” user. </p>
+      <p>Mitigation: A fix has been provided (removing the negative check for 
anonymous user before building the proxy chain and throwing an exception, and 
evaluating each user in the proxy chain iteration and comparing against a 
static constant anonymous user).  This fix was applied in NIFI-3487 and 
released in Apache NiFi 0.7.2 and 1.1.2.  1.x users running a clustered 
environment should upgrade to 1.1.2.  0.x users running a clustered environment 
should upgrade to 0.7.2.  Additional migration guidance can be found <a 
href="https://cwiki.apache.org/confluence/display/NIFI/Migration+Guidance";>here</a>.
 </p>
+      <p>Credit: This issue was discovered by Leonardo Dias in conjunction 
with Matt Gilman.</p>
+        </div>
+     </div>
+</div>
+<div class="row">
+        <div class="large-12 columns">
+            <p><b>CVE-2107-5636</b>: Apache NiFi User Impersonation In Cluster 
Environment</p>
+            <p>Severity: <b>Moderate</b></p>
+            <p>Versions Affected:</p>
+    <ul>
+      <li>Apache NiFi 0.7.0</li>
+      <li>Apache NiFi 0.7.1</li>
+      <li>Apache NiFi 1.1.0</li>
+      <li>Apache NiFi 1.1.1</li>
+    </ul>
+      </p>
+      <p>Description: In a cluster environment, the proxy chain 
serialization/deserialization is vulnerable to an injection attack where a 
carefully crafted username could impersonate another user and gain their 
permissions on a replicated request to another node. </p>
+      <p>Mitigation: A fix has been provided (modification of the tokenization 
code and sanitization of user-provided input).  This fix was applied in 
NIFI-3487 and released in Apache NiFi 0.7.2 and 1.1.2.  1.x users running a 
clustered environment should upgrade to 1.1.2.  0.x users running a clustered 
environment should upgrade to 0.7.2.  Additional migration guidance can be 
found <a 
href="https://cwiki.apache.org/confluence/display/NIFI/Migration+Guidance";>here</a>.
 </p>
+      <p>Credit: This issue was discovered by Andy LoPresto.</p>
+        </div>
+     </div>
+</div>
+<div class="medium-space"></div>
+<div class="row">
+    <div class="large-12 columns features">
         <h2>Fixed in Apache NiFi 1.0.1 and 1.1.1</h2>
     </div>
 </div>
@@ -120,7 +162,7 @@
                </ul>
            </p>
            <p>Description: There is a cross-site scripting vulnerability in 
connection details dialog when accessed by an authorized user. The user 
supplied text was not being properly handled when added to the DOM.</p>
-           <p>Mitigation: 1.0.0 users should upgrade to 1.0.1 or 1.1.1.  1.1.0 
users should upgrade to 1.1.1. Additional migration guidance can be found <a 
href="https://cwiki.apache.org/confluence/display/NIFI/Migration+Guidance";>here</a></p>
+           <p>Mitigation: 1.0.0 users should upgrade to 1.0.1 or 1.1.1.  1.1.0 
users should upgrade to 1.1.1. Additional migration guidance can be found <a 
href="https://cwiki.apache.org/confluence/display/NIFI/Migration+Guidance";>here</a>.
 </p>
            <p>Credit: This issue was discovered by Matt Gilman of the Apache 
NiFi PMC during a code review.</p>
         </div>
      </div>


Reply via email to