Description
In Apache NiFi 1.2.0 to 1.11.4, the NiFi UI and API were protected by mandating TLS v1.2, as well as listening connections established by processors like ListenHTTP, HandleHttpRequest, etc. However intracluster communication such as cluster request replication, Site-to-Site, and load balanced queues continued to support TLS v1.0 or v1.1.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-0688 | In Apache NiFi 1.2.0 to 1.11.4, the NiFi UI and API were protected by mandating TLS v1.2, as well as listening connections established by processors like ListenHTTP, HandleHttpRequest, etc. However intracluster communication such as cluster request replication, Site-to-Site, and load balanced queues continued to support TLS v1.0 or v1.1. |
Github GHSA |
GHSA-rfmp-jvr7-hx78 | Inadequate Encryption Strength in Apache NiFi |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T10:26:16.409Z
Reserved: 2020-03-01T00:00:00.000Z
Link: CVE-2020-9491
No data.
Status : Modified
Published: 2020-10-01T20:15:14.330
Modified: 2024-11-21T05:40:45.750
Link: CVE-2020-9491
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA