Description
The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution. The resolution validates the Database URL and rejects H2 JDBC locations. You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
Remediation
References
http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html
http://www.openwall.com/lists/oss-security/2023/06/12/3
https://lists.apache.org/thread/7b82l4f5blmpkfcynf3y6z4x1vqo59h8
https://nifi.apache.org/security.html#CVE-2023-34468
https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation/
Related Vulnerabilities
CVE-2023-48711 Vulnerability in npm package google-translate-api-browser
CVE-2016-10707 Vulnerability in maven package org.webjars.npm:jquery
CVE-2017-12161 Vulnerability in maven package org.keycloak:keycloak-core
CVE-2020-15168 Vulnerability in maven package org.webjars.npm:node-fetch
CVE-2020-2201 Vulnerability in maven package org.jenkins-ci.plugins:sonargraph-integration