Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCDB8E6A-F4E2-433A-BBE0-737F3A9FA729", "versionEndExcluding": "2.1.0", "versionStartIncluding": "1.10.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Apache NiFi 1.10.0 through 2.0.0 are missing fine-grained authorization checking for Parameter Contexts, referenced Controller Services, and referenced Parameter Providers, when creating new Process Groups.\n\nCreating a new Process Group can include binding to a Parameter Context, but in cases where the Process Group did not reference any Parameter values, the framework did not check user authorization for the bound Parameter Context. Missing authorization for a bound Parameter Context enabled clients to download non-sensitive Parameter values after creating the Process Group.\n\nCreating a new Process Group can also include referencing existing Controller Services or Parameter Providers. The framework did not check user authorization for referenced Controller Services or Parameter Providers, enabling clients to create Process Groups and use these components that were otherwise unauthorized.\n\nThis vulnerability is limited in scope to authenticated users authorized to create Process Groups. The scope is further limited to deployments with component-based authorization policies. Upgrading to Apache NiFi 2.1.0 is the recommended mitigation, which includes authorization checking for Parameter and Controller Service references on Process Group creation."}, {"lang": "es", "value": "Apache NiFi 1.10.0 a 2.0.0 carece de una verificaci\u00f3n de autorizaci\u00f3n detallada para los contextos de par\u00e1metros, los servicios de controlador a los que se hace referencia y los proveedores de par\u00e1metros a los que se hace referencia al crear nuevos grupos de procesos. La creaci\u00f3n de un nuevo grupo de procesos puede incluir la vinculaci\u00f3n a un contexto de par\u00e1metros, pero en los casos en los que el grupo de procesos no hac\u00eda referencia a ning\u00fan valor de par\u00e1metro, el marco no verificaba la autorizaci\u00f3n del usuario para el contexto de par\u00e1metros vinculado. La falta de autorizaci\u00f3n para un contexto de par\u00e1metros vinculado permit\u00eda a los clientes descargar valores de par\u00e1metros no confidenciales despu\u00e9s de crear el grupo de procesos. La creaci\u00f3n de un nuevo grupo de procesos tambi\u00e9n puede incluir la referencia a los servicios de controlador o proveedores de par\u00e1metros existentes. El marco no verificaba la autorizaci\u00f3n del usuario para los servicios de controlador o proveedores de par\u00e1metros a los que se hace referencia, lo que permit\u00eda a los clientes crear grupos de procesos y utilizar estos componentes que de otro modo no estar\u00edan autorizados. Esta vulnerabilidad tiene un alcance limitado a los usuarios autenticados autorizados para crear grupos de procesos. El alcance se limita adem\u00e1s a las implementaciones con pol\u00edticas de autorizaci\u00f3n basadas en componentes. La actualizaci\u00f3n a Apache NiFi 2.1.0 es la mitigaci\u00f3n recomendada, que incluye la verificaci\u00f3n de autorizaci\u00f3n para las referencias del servicio de par\u00e1metros y controladores durante la creaci\u00f3n del grupo de procesos."}], "id": "CVE-2024-56512", "lastModified": "2025-02-11T16:10:28.690", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary"}], "cvssMetricV40": [{"cvssData": {"attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "automatable": "YES", "availabilityRequirements": "NOT_DEFINED", "baseScore": 2.1, "baseSeverity": "LOW", "confidentialityRequirements": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "privilegesRequired": "HIGH", "providerUrgency": "GREEN", "recovery": "USER", "safety": "PRESENT", "subsequentSystemAvailability": "NONE", "subsequentSystemConfidentiality": "LOW", "subsequentSystemIntegrity": "LOW", "userInteraction": "NONE", "valueDensity": "CONCENTRATED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:Y/R:U/V:C/RE:L/U:Green", "version": "4.0", "vulnerabilityResponseEffort": "LOW", "vulnerableSystemAvailability": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "LOW"}, "source": "security@apache.org", "type": "Secondary"}]}, "published": "2024-12-28T17:15:07.967", "references": [{"source": "security@apache.org", "tags": ["Mailing List"], "url": "https://lists.apache.org/thread/cjc8fns5kjsho0s7vonlnojokyfx47wn"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mailing List"], "url": "http://www.openwall.com/lists/oss-security/2024/12/28/1"}], "sourceIdentifier": "security@apache.org", "vulnStatus": "Analyzed", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-638"}], "source": "security@apache.org", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-862"}], "source": "nvd@nist.gov", "type": "Primary"}]}