The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution. The resolution validates the Database URL and rejects H2 JDBC locations. You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://nifi.apache.org/security.html#CVE-2023-34468 | release notes vendor advisory |
https://lists.apache.org/thread/7b82l4f5blmpkfcynf3y6z4x1vqo59h8 | vendor advisory mailing list |
http://www.openwall.com/lists/oss-security/2023/06/12/3 | third party advisory mailing list |
http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html | third party advisory vdb entry |
https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation/ | third party advisory |