Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 6 Apr 2022 12:58:18 -0400
From: Nathan Gough <thenatog@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2022-26850: Apache NiFi: Insufficiently protected credentials

Severity: moderate

Description:

When creating or updating credentials for single-user access, NiFi
wrote a copy of the Login Identity Providers configuration to the
operating system temporary directory. On most platforms, the operating
system temporary directory has global read permissions. NiFi
immediately moved the temporary file to the final configuration
directory, which significantly limited the window of opportunity for
access.

This issue is being tracked as NIFI-9785

Mitigation:

NiFi 1.16.0 includes updates to replace the Login Identity Providers
configuration without writing a file to the operating system temporary
directory.

Credit:

This issue was discovered by Jonathan Leitschuh
(https://twitter.com/jlleitschuh)

References:
https://nifi.apache.org/security.html#CVE-2022-26850

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.