steven-matison commented on code in PR #61:
URL: https://github.com/apache/nifi-site/pull/61#discussion_r917856478


##########
source/security.html:
##########
@@ -53,59 +53,6 @@ <h3>Reporting Methods</h3>
     </div>
 </div>
 
-<div class="medium-space"></div>
-<div class="row">
-    <div class="large-12 columns features">
-        <h2><a id="1.16.0" href="#1.16.0">Fixed in Apache NiFi 1.16.0</a></h2>
-    </div>
-</div>
-<!-- Vulnerabilities -->
-<div class="row">
-    <div class="large-12 columns features">
-        <h2><a id="1.16.0-vulnerabilities" 
href="#1.16.0-vulnerabilities">Vulnerabilities</a></h2>
-    </div>
-</div>
-<div class="row" style="background-color: aliceblue">
-    <div class="large-12 columns">
-        <p><a id="CVE-2022-26850" 
href="#CVE-2022-26850"><strong>CVE-2022-26850</strong></a>: Apache NiFi 
insufficiently protected credentials</p>
-        <p>Severity: <strong>Low</strong></p>
-        <p>Versions Affected:</p>
-        <ul>
-            <li>Apache NiFi 1.14.0 - 1.15.3</li>
-        </ul>
-        </p>
-        <p>Description: When creating or updating credentials for single-user 
access, NiFi wrote a copy of the Login Identity Providers configuration to the 
operating system temporary directory. <b>The Login Identity Providers 
configuration file contains the username and a bcrypt hash of the configured 
password</b>. On most platforms, the operating system temporary directory has 
global read permissions. NiFi immediately moved the temporary file to the final 
configuration directory, which significantly limited the window of opportunity 
for access.</p>
-            <p>Bcrypt is a password-hashing algorithm that incorporates a 
random salt and a specified cost factor, designed to maintain resistance to 
brute-force attacks. Use of the bcrypt algorithm minimizes the impact of 
disclosing the single-user credentials stored in Login Identity Providers.</p>
-        <p>Mitigation: NiFi 1.16.0 includes updates to replace the Login 
Identity Providers configuration without writing a file to the operating system 
temporary directory.</p>
-        <p>Credit: This issue was discovered by Jonathan Leitschuh 
(https://twitter.com/jlleitschuh). Report available here: <a 
href="https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-rvp4-r3g6-8hxq";
 target="_blank">JLLeitschuh Github</a></p>
-        <p>CVE Link: <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26850"; 
target="_blank">Mitre Database: CVE-2022-26850</a></p>
-        <p>NiFi Jira: <a 
href="https://issues.apache.org/jira/browse/NIFI-9785"; 
target="_blank">NIFI-9785</a></p>
-        <p>NiFi PR: <a href="https://github.com/apache/nifi/pull/5856"; 
target="_blank">PR 5856</a></p>
-        <p>Released: March 27, 2022</p>
-    </div>
-</div>
-<!-- Dependency Vulnerabilities -->
-<div class="row">
-    <div class="large-12 columns features">
-        <h2><a id="1.16.0-dependency-vulnerabilities" 
href="#1.16.0-dependency-vulnerabilities">Dependency Vulnerabilities</a></h2>
-    </div>
-</div>
-<div class="row">
-    <div class="large-12 columns">
-        <p><a id="CVE-2021-42392" 
href="#CVE-2021-42392"><strong>CVE-2021-42392</strong></a>: Apache NiFi's use 
of H2 database</p>
-        <p>Severity: <strong>Important</strong></p>
-        <p>Versions Affected:</p>
-        <ul>
-            <li>Apache NiFi 0.0.1 - 1.15.3</li>
-        </ul>
-        </p>
-        <p>Description: Apache NiFi uses H2 database for storing various NiFi 
runtime details. H2 database had a critical vulnerability similar to Log4Shell 
which potentially allows JNDI remote codebase loading. In NiFi, by default, 
console access to the database is restricted to local machine access only and 
remote access is disabled which limited the severity of this vulnerability. 
More detailed information on the H2 vulnerability can be found in <a 
href="https://thesecmaster.com/how-to-fix-cve-2021-42392-a-critical-unauthenticated-rce-in-h2-database-console/";>this
 blog post.</a></p>
-        <p>Mitigation: We have upgraded the H2 version that NiFi uses from 
1.4.199 to 2.1.210. The vulnerability is also mitigated with more recent 
versions of Java (6u211 , 7u201, 8u191, 11.0.1 onwards). </p>
-        <p>CVE Link: <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42392"; 
target="_blank">Mitre Database: CVE-2021-42392</a></p>
-        <p>NiFi Jira: <a 
href="https://issues.apache.org/jira/browse/NIFI-9585"; 
target="_blank">NIFI-9585</a></p>
-        <p>Released: March 27, 2022</p>
-    </div>
-</div>

Review Comment:
   I think this is just content missing from the latests updates since this 
project started.
   I have reset this page with content from `src/pages/html/security.hbs`



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to