NVD - CVE-2023-40037
Vulnerabilities
CVE-2023-40037
Detail
Modified After Enrichment
This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.
Current Description
Apache NiFi 1.21.0 through 1.23.0 support JDBC and JNDI JMS access in several Processors and Controller Services with connection URL validation that does not provide sufficient protection against crafted inputs. An authenticated and authorized user can bypass connection URL validation using custom input formatting. The resolution enhances connection URL validation and introduces validation for additional related properties. Upgrading to Apache NiFi 1.23.1 is the recommended mitigation.
View Analysis Description
Analysis
Description
Apache NiFi 1.21.0 through 1.23.0 support JDBC and JNDI JMS access in several Processors and Controller Services with connection URL validation that does not provide sufficient protection against crafted inputs. An authenticated and authorized user can bypass connection URL validation using custom input formatting. The resolution enhances connection URL validation and introduces validation for additional related properties. Upgrading to Apache NiFi 1.23.1 is the recommended mitigation.
Metrics
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
CVSS 4.0 Severity and Vector Strings:
NIST:
NVD
N/A
NVD assessment
not yet provided.
CVSS 3.x Severity and Vector Strings:
NIST:
NVD
Base
Score:
6.5 MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CVSS 2.0 Severity and Vector Strings:
NIST:
NVD
Base
Score:
N/A
NVD assessment
not yet provided.
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to
[email protected]
URL
Source(s)
Tag(s)
Apache Software Foundation, CVE
Mailing List
Third Party Advisory
Apache Software Foundation, CVE
Mailing List
Apache Software Foundation, CVE
Vendor Advisory
Weakness Enumeration
CWE-ID
CWE Name
Source
CWE-697
Incorrect Comparison
NIST
CWE-184
Incomplete List of Disallowed Inputs
Apache Software Foundation
Known Affected Software Configurations
Switch
to CPE 2.2
CPEs loading, please wait.
Change History
5 change records found
show changes
CVE Modified by Apache Software Foundation
2/13/2025 12:17:00 PM
Action
Type
Old Value
New Value
Changed
Description
Apache NiFi 1.21.0 through 1.23.0 support JDBC and JNDI JMS access in several Processors and Controller Services with connection URL validation that does not provide sufficient protection against crafted inputs. An authenticated and authorized user can bypass connection URL validation using custom input formatting. The resolution enhances connection URL validation and introduces validation for additional related properties. Upgrading to Apache NiFi 1.23.1 is the recommended mitigation.
Apache NiFi 1.21.0 through 1.23.0 support JDBC and JNDI JMS access in several Processors and Controller Services with connection URL validation that does not provide sufficient protection against crafted inputs. An authenticated and authorized user can bypass connection URL validation using custom input formatting. The resolution enhances connection URL validation and introduces validation for additional related properties. Upgrading to Apache NiFi 1.23.1 is the recommended mitigation.
CVE Modified by CVE
11/21/2024 3:18:34 AM
Action
Type
Old Value
New Value
Added
Reference
Added
Reference
Added
Reference
CVE Modified by Apache Software Foundation
5/14/2024 9:36:16 AM
Action
Type
Old Value
New Value
Initial Analysis by NIST
8/23/2023 12:59:00 PM
Action
Type
Old Value
New Value
Added
CVSS V3.1
NIST AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Added
CWE
NIST CWE-697
Added
CPE Configuration
OR
*cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:* versions from (including) 1.21.0 up to (excluding) 1.23.1
Changed
Reference Type
Changed
Reference Type
Changed
Reference Type
CVE Modified by Apache Software Foundation
8/18/2023 8:15:09 PM
Action
Type
Old Value
New Value
Added
Reference
Quick Info
CVE Dictionary Entry:
CVE-2023-40037
NVD
Published Date:
08/18/2023
NVD
Last Modified:
02/13/2025
Source:
Apache Software Foundation
US