|
|
Message-ID: <CAEqiR7SDjvexnZ13sYUaMFYMcqk+hgLzOmTJ4MwEyrD=Z9tqcA@mail.gmail.com> Date: Mon, 13 Apr 2026 09:25:52 -0500 From: David Handermann <exceptionfactory@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2026-39816: Apache NiFi: Missing Execute Code Required Permission on TinkerpopClientService Severity: High Affected versions: - Apache NiFi (org.apache.nifi:nifi-other-graph-services-nar) 2.0.0-M1 through 2.8.0 Description: The optional extension component TinkerpopClientService is missing the Restricted annotation with the Execute Code Required Permission in Apache NiFi 2.0.0-M1 through 2.8.0. The TinkerpopClientService supports configuration of ByteCode Submission for the Script Submission Type, enabling Groovy Script execution in the service prior to submitting the query. The missing Restricted annotation allows users without the Execute Code Permission to configure the Service in installations that use fine-grained authorization and have the optional TinkerpopClientService installed. Apache NiFi installations that do not have the nifi-other-graph-services-nar installed are not subject to this vulnerability. Upgrading to Apache NiFi 2.9.0 is the recommended mitigation. This issue is being tracked as NIFI-15800 Credit: John Walker from ZeroPath (finder) References: https://nifi.apache.org/ https://www.cve.org/CVERecord?id=CVE-2026-39816 https://issues.apache.org/jira/browse/NIFI-15800 Timeline: 2026-04-03: reported 2026-04-06: patched
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.