Cross site scripting in org.apache.nifi:nifi
Moderate severity
GitHub Reviewed
Published
Dec 20, 2018
to the GitHub Advisory Database
•
Updated Mar 4, 2024
Description
Published to the GitHub Advisory Database
Dec 20, 2018
Reviewed
Jun 16, 2020
Last updated
Mar 4, 2024
The message-page.jsp error page used the value of the HTTP request header X-ProxyContextPath without sanitization, resulting in a reflected XSS attack. Mitigation: The fix to correctly parse and sanitize the request attribute value was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
References