Author: alopresto
Date: Tue May 22 17:59:58 2018
New Revision: 1832051

URL: http://svn.apache.org/viewvc?rev=1832051&view=rev
Log:
Added Mitre links and fixed typo on security.html.

Modified:
    nifi/site/trunk/security.html

Modified: nifi/site/trunk/security.html
URL: 
http://svn.apache.org/viewvc/nifi/site/trunk/security.html?rev=1832051&r1=1832050&r2=1832051&view=diff
==============================================================================
--- nifi/site/trunk/security.html (original)
+++ nifi/site/trunk/security.html Tue May 22 17:59:58 2018
@@ -163,10 +163,11 @@
         <p>Description: Malicious XML content could cause information 
disclosure or remote code execution. </p>
         <p>Mitigation: The fix to disable external general entity parsing and 
disallow doctype declarations was applied on the Apache NiFi 1.6.0 release. 
Users running a prior 1.x release should upgrade to the appropriate release. 
</p>
         <p>Credit: This issue was discovered by 圆珠笔. </p>
+        <p>CVE Link: <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1309"; 
target="_blank">Mitre Database: CVE-2018-1309</a></p>
         <p>Released: April 8, 2018</p>
     </div>
 </div>
-<div class="row">
+<div class="row" style="background-color: aliceblue">
     <div class="large-12 columns">
         <p><a id="CVE-2018-1310" 
href="#CVE-2018-1310"><strong>CVE-2018-1310</strong></a>: Apache NiFi JMS 
Deserialization issue because of ActiveMQ client vulnerability</p>
         <p>Severity: <strong>Moderate</strong></p>
@@ -178,6 +179,7 @@
         <p>Description: Malicious JMS content could cause denial of service. 
See <a 
href="http://activemq.apache.org/security-advisories.data/CVE-2015-5254-announcement.txt";
 target="_blank">ActiveMQ CVE-2015-5254 announcement</a> for more information. 
</p>
         <p>Mitigation: The fix to upgrade the activemq-client library to 
5.15.3 was applied on the Apache NiFi 1.6.0 release. Users running a prior 1.x 
release should upgrade to the appropriate release. </p>
         <p>Credit: This issue was discovered by 圆珠笔. </p>
+        <p>CVE Link: <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1310"; 
target="_blank">Mitre Database: CVE-2018-1310</a></p>
         <p>Released: April 8, 2018</p>
     </div>
 </div>
@@ -193,12 +195,13 @@
         <p>Description: Spring Security LDAP library was not enforcing 
credential authentication after TLS handshake negotiation. See <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2017-8028"; target="_blank">NVD 
CVE-2017-8028 disclosure</a> for more information. </p>
         <p>Mitigation: The fix to upgrade the spring-ldap library to 
2.3.2.RELEASE+ was applied on the Apache NiFi 1.6.0 release. Users running a 
prior 1.x release should upgrade to the appropriate release. </p>
         <p>Credit: This issue was discovered by Matthew Elder. </p>
+        <p>CVE Link: <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8028"; 
target="_blank">Mitre Database: CVE-2017-8028</a></p>
         <p>Released: April 8, 2018</p>
     </div>
 </div>
-<div class="row">
+<div class="row" style="background-color: aliceblue">
     <div class="large-12 columns">
-        <p><a id="CVE-2018-1324" 
href="#CVE-2018-1324"><strong>CVE-2018-1324</strong></a>: Apache NiFi Denial of 
service issue because of commons-compress vulnerability</p>
+        <p><a id="CVE-2018-1234" 
href="#CVE-2018-1234"><strong>CVE-2018-1234</strong></a>: Apache NiFi Denial of 
service issue because of commons-compress vulnerability</p>
         <p>Severity: <strong>Low</strong></p>
         <p>Versions Affected:</p>
         <ul>
@@ -208,6 +211,7 @@
         <p>Description: A vulnerability in the commons-compress library could 
cause denial of service. See <a 
href="https://commons.apache.org/proper/commons-compress/security-reports.html"; 
target="_blank">commons-compress CVE-2018-1234 announcement</a> for more 
information. </p>
         <p>Mitigation: The fix to upgrade the commons-compress library to 
1.16.1 was applied on the Apache NiFi 1.6.0 release. Users running a prior 1.x 
release should upgrade to the appropriate release. </p>
         <p>Credit: This issue was discovered by Joe Witt. </p>
+        <p>CVE Link: <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1234"; 
target="_blank">Mitre Database: CVE-2018-1234</a></p>
         <p>Released: April 8, 2018</p>
     </div>
 </div>
@@ -229,10 +233,11 @@
         <p>Description: A malicious host header in an incoming HTTP request 
could cause NiFi to load resources from an external server. </p>
         <p>Mitigation: The fix to sanitize host headers and compare to a 
controlled whitelist was applied on the Apache NiFi 1.5.0 release. Users 
running a prior 1.x release should upgrade to the appropriate release. </p>
         <p>Credit: This issue was discovered by Mike Cole. </p>
+        <p>CVE Link: <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12632"; 
target="_blank">Mitre Database: CVE-2017-12632</a></p>
         <p>Released: January 12, 2018</p>
     </div>
 </div>
-<div class="row">
+<div class="row" style="background-color: aliceblue">
     <div class="large-12 columns">
         <p><a id="CVE-2017-15697" 
href="#CVE-2017-15697"><strong>CVE-2017-15697</strong></a>: Apache NiFi XSS 
issue in context path handling</p>
         <p>Severity: <strong>Moderate</strong></p>
@@ -244,6 +249,7 @@
         <p>Description: A malicious <code>X-ProxyContextPath</code> or 
<code>X-Forwarded-Context</code> header containing external resources or 
embedded code could cause remote code execution. </p>
         <p>Mitigation: The fix to properly handle these headers was applied on 
the Apache NiFi 1.5.0 release. Users running a prior 1.x release should upgrade 
to the appropriate release. </p>
         <p>Credit: This issue was discovered by Andy LoPresto. </p>
+        <p>CVE Link: <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15697"; 
target="_blank">Mitre Database: CVE-2017-15697</a></p>
         <p>Released: January 12, 2018</p>
     </div>
 </div>
@@ -265,10 +271,11 @@
         <p>Description: <del>An authorized user</del> Any authenticated user 
(valid client certificate but without ACL permissions) could upload a template 
which contained malicious code and accessed sensitive files via an XML External 
Entity (XXE) attack. </p>
         <p>Mitigation: The fix to properly handle XML External Entities was 
applied on the Apache NiFi 1.4.0 release. Users running a prior 1.x release 
should upgrade to the appropriate release. </p>
         <p>Credit: This issue was discovered by Paweł Gocyla and further 
information was provided by Mike Cole. </p>
+        <p>CVE Link: <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12623"; 
target="_blank">Mitre Database: CVE-2017-12623</a></p>
         <p>Released: October 2, 2017 (Updated January 23, 2018)</p>
     </div>
 </div>
-<div class="row">
+<div class="row" style="background-color: aliceblue">
     <div class="large-12 columns">
         <p><a id="CVE-2017-15703" 
href="#CVE-2017-15703"><b>CVE-2017-15703</b></a>: Apache NiFi Java 
deserialization issue in template XML upload</p>
         <p>Severity: <strong>Moderate</strong></p>
@@ -280,6 +287,7 @@
         <p>Description: Any authenticated user (valid client certificate but 
without ACL permissions) could upload a template which contained malicious code 
and caused a denial of service via Java deserialization attack. </p>
         <p>Mitigation: The fix to properly handle Java deserialization was 
applied on the Apache NiFi 1.4.0 release. Users running a prior 1.x release 
should upgrade to the appropriate release. </p>
         <p>Credit: This issue was discovered by Mike Cole. </p>
+        <p>CVE Link: <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15703"; 
target="_blank">Mitre Database: CVE-2017-15703</a></p>
         <p>Released: October 2, 2017 (Updated January 25, 2018)</p>
     </div>
 </div>
@@ -306,7 +314,7 @@
         <p>Released: May 8, 2017 (1.2.0); May 17, 2017 (0.7.3)</p>
     </div>
 </div>
-<div class="row">
+<div class="row" style="background-color: aliceblue">
     <div class="large-12 columns">
         <p><a id="CVE-2017-7667" 
href="#CVE-2017-7667"><b>CVE-2017-7667</b></a>: Apache NiFi XFS issue due to 
insufficient response headers</p>
         <p>Severity: <b>Important</b></p>
@@ -350,7 +358,7 @@
         <p>Released: February 20, 2017</p>
     </div>
 </div>
-<div class="row">
+<div class="row" style="background-color: aliceblue">
     <div class="large-12 columns">
         <p><a id="CVE-2017-5636" 
href="#CVE-2017-5636"><b>CVE-2017-5636</b></a>: Apache NiFi User Impersonation 
In Cluster Environment</p>
         <p>Severity: <b>Moderate</b></p>


Reply via email to