This is an automated email from the ASF dual-hosted git repository. exceptionfactory pushed a commit to branch main-staging in repository https://gitbox.apache.org/repos/asf/nifi-site.git
commit 789327806c041cf4cc82701dc6dbf5cd18945833 Author: exceptionfactory <[email protected]> AuthorDate: Mon Nov 27 15:50:26 2023 -0600 NIFI-12362 Published CVE-2023-49145 (cherry picked from commit b3e2c5f0445b1ed416f00ce7685c5a05f6ece992) --- source/security.html | 43 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 43 insertions(+) diff --git a/source/security.html b/source/security.html index 4e543e2..678ea33 100644 --- a/source/security.html +++ b/source/security.html @@ -63,6 +63,49 @@ title: Apache NiFi Security Reports </div> <div class="medium-space"></div> +<div class="row"> + <div class="large-12 columns features"> + <h2><a id="1.24.0" href="#1.24.0">Fixed in Apache NiFi 1.24.0</a></h2> + </div> +</div> +<!-- Vulnerabilities --> +<div class="row"> + <div class="large-12 columns features"> + <h2><a id="1.24.0-vulnerabilities" href="#1.24.0-vulnerabilities">Vulnerabilities</a></h2> + </div> +</div> +<div class="row" style="background-color: aliceblue"> + <div class="large-12 columns"> + <p><a id="CVE-2023-49145" href="#CVE-2023-49145"><strong>CVE-2023-49145</strong></a>: Improper Neutralization of Input in Advanced User Interface for Jolt</p> + <p>Severity: <strong>High</strong></p> + <p>Versions Affected:</p> + <ul> + <li>Apache NiFi 0.7.0 - 1.23.2</li> + </ul> + </p> + <p> + Apache NiFi 0.7.0 through 1.23.2 include the JoltTransformJSON + Processor, which provides an advanced configuration user interface that + is vulnerable to DOM-based cross-site scripting. If an authenticated + user, who is authorized to configure a JoltTransformJSON Processor, + visits a crafted URL, then arbitrary + JavaScript code can be executed within the session context of the + authenticated user. Upgrading to Apache NiFi 1.24.0 or 2.0.0-M1 is the recommended + mitigation. + </p> + <p>Credit: This issue was discovered by Dr. Oliver Matula, DB Systel GmbH</p> + <p>CVE Link: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49145" target="_blank">Mitre Database CVE-2023-49145</a></p> + <p> + NiFi Jira: <a href="https://issues.apache.org/jira/browse/NIFI-12403" target="_blank">NIFI-12403</a> + </p> + <p> + NiFi PR: <a href="https://github.com/apache/nifi/pull/8060" target="_blank">PR 8060</a> + </p> + <p>Released: 2023-11-27</p> + </div> +</div> +<div class="medium-space"></div> + <div class="row"> <div class="large-12 columns features"> <h2><a id="1.23.1" href="#1.23.1">Fixed in Apache NiFi 1.23.1</a></h2>
