Raman N created NIFI-9676:
-----------------------------

             Summary: Upgrade xmlsec to 2.1.7/2.2.3 due to CVE-2021-40690
                 Key: NIFI-9676
                 URL: https://issues.apache.org/jira/browse/NIFI-9676
             Project: Apache NiFi
          Issue Type: Bug
            Reporter: Raman N


is currently pulling in xmlsec 1.5.8 as a transitive dependency (detected by 
Trivy). This needs to be upgraded to 2.2.3+ due to CVE-2021-40690.

 
{code:java}
        {
          "VulnerabilityID": "CVE-2021-40690",
          "PkgName": "org.apache.santuario:xmlsec",
          "PkgPath": "opt/nifi/nifi-toolkit-current/lib/xmlsec-1.5.8.jar",
          "InstalledVersion": "1.5.8",
          "FixedVersion": "2.1.7, 2.2.3",
          "Layer": {
            "Digest": 
"sha256:4e4453b0591c2445b47576e4a8721ccc1bb1e7312c9f78c6c0f7fdbddad2a0f3",
            "DiffID": 
"sha256:5e21f394214906c7864139895d26d2dae021b68493693c633f5f9b0a690ae2b2"
          },
          "SeveritySource": "ghsa-maven",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-40690";,
          "Title": "xml-security: XPath Transform abuse allows for information 
disclosure",
          "Description": "All versions of Apache Santuario - XML Security for 
Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the 
\"secureValidation\" property is not passed correctly when creating a KeyInfo 
from a KeyInfoReference element. This allows an attacker to abuse an XPath 
Transform to extract any local .xml files in a RetrievalMethod element.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-200"
          ],
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 5,
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 7.5
            }
          },
{code}



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

Reply via email to