Total vulnerabilities in the database
The message-page.jsp error page used the value of the HTTP request header X-ProxyContextPath without sanitization, resulting in a reflected XSS attack. Mitigation: The fix to correctly parse and sanitize the request attribute value was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
Software | From | Fixed in |
---|---|---|
apache / nifi | 1.0.0 | 1.7.1.x |
![]() |
1.0.0 | 1.8.0 |