The message-page.jsp error page used the value of the HTTP request header X-ProxyContextPath without sanitization, resulting in a reflected XSS attack. Mitigation: The fix to correctly parse and sanitize the request attribute value was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-0797 The message-page.jsp error page used the value of the HTTP request header X-ProxyContextPath without sanitization, resulting in a reflected XSS attack. Mitigation: The fix to correctly parse and sanitize the request attribute value was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
Github GHSA Github GHSA GHSA-4qq9-rrq6-48ff Cross site scripting in org.apache.nifi:nifi
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-05T10:39:59.641Z

Reserved: 2018-09-19T00:00:00

Link: CVE-2018-17193

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-12-19T14:29:00.393

Modified: 2024-11-21T03:54:03.860

Link: CVE-2018-17193

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.