This is an automated email from the ASF dual-hosted git repository.

pvillard pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/nifi-site.git


The following commit(s) were added to refs/heads/main by this push:
     new ddc5d99a NIFI-14272 - Published CVE-2025-27017
ddc5d99a is described below

commit ddc5d99ad662e07f7f4cc0d7fea63f86f46555ba
Author: Pierre Villard <[email protected]>
AuthorDate: Tue Mar 11 16:22:40 2025 +0100

    NIFI-14272 - Published CVE-2025-27017
---
 content/documentation/security.md | 19 +++++++++++++++++++
 1 file changed, 19 insertions(+)

diff --git a/content/documentation/security.md 
b/content/documentation/security.md
index 9c9f7efc..6fca6225 100644
--- a/content/documentation/security.md
+++ b/content/documentation/security.md
@@ -63,6 +63,25 @@ Severity ratings represent the determination of project 
members based on an eval
 # Published Vulnerabilities
 
 The following announcements include published vulnerabilities that apply 
directly to Apache NiFi components.
+ 
+{{< vulnerability
+id="CVE-2025-27017"
+title="Potential Insertion of MongoDB Password in Provenance Record"
+published="2025-03-11"
+severity="Medium"
+products="Apache NiFi"
+affectedVersions="1.13.0 to 2.2.0"
+fixedVersion="2.3.0"
+jira="NIFI-14272"
+pullRequest="9723"
+reporter="Robert Creese" >}}
+
+Apache NiFi 1.13.0 through 2.2.0 includes the username and password used to 
authenticate with MongoDB in the NiFi
+provenance events that MongoDB components generate during processing. An 
authorized user with read access to the
+provenance events of those processors may see the credentials information. 
Upgrading to Apache NiFi 2.3.0 is the
+recommended mitigation, which removes the credentials from provenance event 
records.
+
+{{</ vulnerability >}}
 
 {{< vulnerability
 id="CVE-2024-56512"

Reply via email to