Vulnerability Description
Apache NiFi 1.10.0 through 1.26.0 and 2.0.0-M1 through 2.0.0-M3 support a description field in the Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session context of the authenticated user. Upgrading to Apache NiFi 1.27.0 or 2.0.0-M4 is the recommended mitigation.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Nifi | >= 1.10.0, < 1.27.0 |
Related Weaknesses (CWE)
References
- https://lists.apache.org/thread/yso9fr0wtff53nk046h1o83hdyb1lrxhMailing List
- http://www.openwall.com/lists/oss-security/2024/07/08/1
- https://lists.apache.org/thread/yso9fr0wtff53nk046h1o83hdyb1lrxhMailing List
FAQ
What is CVE-2024-37389?
CVE-2024-37389 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Apache NiFi 1.10.0 through 1.26.0 and 2.0.0-M1 through 2.0.0-M3 support a description field in the Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, au...
How severe is CVE-2024-37389?
CVE-2024-37389 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-37389?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Nifi.