Description
If NiFi Registry 0.1.0 to 0.5.0 uses an authentication mechanism other than PKI, when the user clicks Log Out, NiFi Registry invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to NiFi Registry.
Remediation
References
https://nifi.apache.org/registry-security.html#CVE-2020-9482
Related Vulnerabilities
CVE-2023-50764 Vulnerability in maven package org.jenkins-ci.plugins:scriptler
CVE-2023-29527 Vulnerability in maven package org.xwiki.platform:xwiki-platform-appwithinminutes-ui
CVE-2021-21266 Vulnerability in maven package org.openhab.addons.bundles:org.openhab.binding.gce
CVE-2022-27772 Vulnerability in maven package org.springframework.boot:spring-boot
CVE-2023-26488 Vulnerability in npm package @openzeppelin/contracts-upgradeable