Description
The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution. The resolution validates the Database URL and rejects H2 JDBC locations. You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
Remediation
References
http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html
http://www.openwall.com/lists/oss-security/2023/06/12/3
https://lists.apache.org/thread/7b82l4f5blmpkfcynf3y6z4x1vqo59h8
https://nifi.apache.org/security.html#CVE-2023-34468
https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation/
Related Vulnerabilities
CVE-2023-46495 Vulnerability in npm package @evershop/evershop
CVE-2017-2652 Vulnerability in maven package org.jvnet.hudson.plugins:distfork
CVE-2014-3599 Vulnerability in maven package org.hornetq.rest:hornetq-rest
CVE-2019-10305 Vulnerability in maven package com.xebialabs.xl-deploy:jenkins-dependendencies