Description
Apache NiFi 0.0.2 through 1.22.0 include Processors and Controller Services that support HTTP URL references for retrieving drivers, which allows an authenticated and authorized user to configure a location that enables custom code execution. The resolution introduces a new Required Permission for referencing remote resources, restricting configuration of these components to privileged users. The permission prevents unprivileged users from configuring Processors and Controller Services annotated with the new Reference Remote Resources restriction. Upgrading to Apache NiFi 1.23.0 is the recommended mitigation.
Remediation
References
http://seclists.org/fulldisclosure/2023/Jul/43
http://www.openwall.com/lists/oss-security/2023/07/29/1
https://lists.apache.org/thread/swnly3dzhhq9zo3rofc8djq77stkhbof
https://nifi.apache.org/security.html#CVE-2023-36542
Related Vulnerabilities
CVE-2021-21615 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2021-23337 Vulnerability in maven package org.webjars.bowergithub.lodash:lodash
CVE-2019-10460 Vulnerability in maven package org.jenkins-ci.plugins:bitbucket-oauth
CVE-2020-8237 Vulnerability in maven package org.webjars.bower:json-bigint
CVE-2021-45105 Vulnerability in maven package org.apache.logging.log4j:log4j-core