
We found results for “”
CVE-2017-12632
Good to know:


Date: January 23, 2018
A malicious host header in an incoming HTTP request could cause NiFi to load resources from an external server. The fix to sanitize host headers and compare to a controlled whitelist was applied on the Apache NiFi 1.5.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
Language: Java
Severity Score
Severity Score
Weakness Type (CWE)
Improper Input Validation
CWE-20Top Fix

Upgrade Version
Upgrade to version org.apache.nifi:nifi-web-utils:1.5.0;org.apache.nifi:nifi-web-utils:1.5.0;org.apache.nifi:nifi-web-utils:1.5.0;org.apache.nifi:nifi-web-utils:1.5.0;org.apache.nifi:nifi-properties:1.5.0;org.apache.nifi:nifi-properties:1.5.0;org.apache.nifi:nifi-properties:1.5.0;org.apache.nifi:nifi-properties:1.5.0
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | HIGH |
Availability (A): | NONE |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | LOW |
Authentication (AU): | NONE |
Confidentiality (C): | NONE |
Integrity (I): | PARTIAL |
Availability (A): | NONE |
Additional information: |