Description
The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the versions of Java, Jersey, and Apache that the NiFI instance uses.
Remediation
References
https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E
https://nifi.apache.org/security.html#CVE-2019-10080
https://www.oracle.com/security-alerts/cpuApr2021.html
Related Vulnerabilities
CVE-2020-2296 Vulnerability in maven package org.jenkins-ci.plugins:shared-objects
CVE-2020-5219 Vulnerability in maven package org.webjars.npm:angular-expressions
CVE-2023-28708 Vulnerability in maven package org.apache.tomcat:tomcat-catalina
CVE-2021-20262 Vulnerability in maven package org.keycloak:keycloak-core
CVE-2018-1999002 Vulnerability in maven package org.jenkins-ci.main:jenkins-core