Description
A malicious host header in an incoming HTTP request could cause NiFi to load resources from an external server. The fix to sanitize host headers and compare to a controlled whitelist was applied on the Apache NiFi 1.5.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5496 | A malicious host header in an incoming HTTP request could cause NiFi to load resources from an external server. The fix to sanitize host headers and compare to a controlled whitelist was applied on the Apache NiFi 1.5.0 release. Users running a prior 1.x release should upgrade to the appropriate release. |
Github GHSA |
GHSA-w4x6-j349-9r57 | Apache NiFi host header poisoning issue |
References
| Link | Providers |
|---|---|
| https://nifi.apache.org/security.html#CVE-2017-12632 |
|
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-16T20:01:20.753Z
Reserved: 2017-08-07T00:00:00.000Z
Link: CVE-2017-12632
No data.
Status : Modified
Published: 2018-01-23T22:29:00.277
Modified: 2024-11-21T03:09:56.150
Link: CVE-2017-12632
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA