Giter VIP home page Giter VIP logo

snowdensb / nifi Goto Github PK

View Code? Open in Web Editor NEW

This project forked from apache/nifi

0.0 0.0 0.0 175.14 MB

Apache NiFi

Home Page: https://nifi.apache.org/

License: Apache License 2.0

JavaScript 6.55% CSS 0.47% Java 86.25% GAP 0.05% Shell 0.30% HTML 1.68% XSLT 0.01% Batchfile 0.07% Groovy 4.32% Ruby 0.04% Python 0.05% Lua 0.01% Clojure 0.01% Dockerfile 0.04% C++ 0.01% Handlebars 0.12% PLpgSQL 0.01% SCSS 0.04%

nifi's Introduction

Apache NiFi

ci-workflow Docker pulls Version Slack

Apache NiFi is an easy to use, powerful, and reliable system to process and distribute data.

Table of Contents

Features

Apache NiFi was made for dataflow. It supports highly configurable directed graphs of data routing, transformation, and system mediation logic. Some of its key features include:

  • Web-based user interface
    • Seamless experience for design, control, and monitoring
    • Multi-tenant user experience
  • Highly configurable
    • Loss tolerant vs guaranteed delivery
    • Low latency vs high throughput
    • Dynamic prioritization
    • Flows can be modified at runtime
    • Back pressure
    • Scales up to leverage full machine capability
    • Scales out with zero-leader clustering model
  • Data Provenance
    • Track dataflow from beginning to end
  • Designed for extension
    • Build your own processors and more
    • Enables rapid development and effective testing
  • Secure
    • SSL, SSH, HTTPS, encrypted content, etc...
    • Pluggable fine-grained role-based authentication/authorization
    • Multiple teams can manage and share specific portions of the flow

Minimum Requirements

  • JDK 8
  • Apache Maven 3.6.0

Getting Started

Read through the quickstart guide for development. It will include information on getting a local copy of the source, give pointers on issue tracking, and provide some warnings about common problems with development environments.

For a more comprehensive guide to development and information about contributing to the project read through the NiFi Developer's Guide.

Building

Run mvn clean install or for parallel build execute mvn -T 2.0C clean install.

The parallel build should take around fifteen minutes on modern hardware.

laptop:nifi myuser$ mvn -T 2.0C clean install
[INFO] Scanning for projects...
[INFO] Inspecting build with total of 115 modules...
    ...tens of thousands of lines elided...
[INFO] ------------------------------------------------------------------------
[INFO] BUILD SUCCESS
[INFO] ------------------------------------------------------------------------
[INFO] Total time: 09:24 min (Wall Clock)
[INFO] Finished at: 2015-04-30T00:30:36-05:00
[INFO] Final Memory: 173M/1359M
[INFO] ------------------------------------------------------------------------

Run mvn clean install -DskipTests to skip unit test execution.

Deploying

Change directories to nifi-assembly. The target directory contains binary archives.

laptop:nifi myuser$ cd nifi-assembly
laptop:nifi-assembly myuser$ ls -lhd target/nifi*
drwxr-xr-x  3 myuser  mygroup   102B Apr 30 00:29 target/nifi-1.0.0-SNAPSHOT-bin
-rw-r--r--  1 myuser  mygroup   144M Apr 30 00:30 target/nifi-1.0.0-SNAPSHOT-bin.tar.gz
-rw-r--r--  1 myuser  mygroup   144M Apr 30 00:30 target/nifi-1.0.0-SNAPSHOT-bin.zip

Copy the nifi-VERSION-bin.tar.gz or nifi-VERSION-bin.zip to a separate deployment directory. Extracting the distribution will create a new directory named for the version.

laptop:nifi-assembly myuser$ mkdir ~/example-nifi-deploy
laptop:nifi-assembly myuser$ tar xzf target/nifi-*-bin.tar.gz -C ~/example-nifi-deploy
laptop:nifi-assembly myuser$ ls -lh ~/example-nifi-deploy/
total 0
drwxr-xr-x  10 myuser  mygroup   340B Apr 30 01:06 nifi-1.0.0-SNAPSHOT

Starting

Change directories to the deployment location and run the following command to start NiFi.

laptop:~ myuser$ cd ~/example-nifi-deploy/nifi-*
laptop:nifi-1.0.0-SNAPSHOT myuser$ ./bin/nifi.sh start

Running bin/nifi.sh start starts NiFi in the background and exits. Use --wait-for-init with an optional timeout in seconds to wait for a complete startup before exiting.

laptop:nifi-1.0.0-SNAPSHOT myuser$ ./bin/nifi.sh start --wait-for-init 120

Authenticating

The default configuration generates a random username and password on startup. NiFi writes the generated credentials to the application log located in logs/nifi-app.log under the NiFi installation directory.

The following command can be used to find the generated credentials on operating systems with grep installed:

laptop:nifi-1.0.0-SNAPSHOT myuser$ grep Generated logs/nifi-app*log

NiFi logs the generated credentials as follows:

Generated Username [USERNAME]
Generated Password [PASSWORD]

The USERNAME will be a random UUID composed of 36 characters. The PASSWORD will be a random string composed of 32 characters. The generated credentials will be stored in conf/login-identity-providers.xml with the password stored using bcrypt hashing. Record these credentials in a secure location for access to NiFi.

The random username and password can be replaced with custom credentials using the following command:

./bin/nifi.sh set-single-user-credentials <username> <password>

Running

Open the following link in a web browser to access NiFi: https://localhost:8443/nifi

The web browser will display a warning message indicating a potential security risk due to the self-signed certificate NiFi generated during initialization. Accepting the potential security risk and continuing to load the interface is an option for initial development installations. Production deployments should provision a certificate from a trusted certificate authority and update the NiFi keystore and truststore configuration.

Accessing NiFi after accepting the self-signed certificate will display the login screen. NiFi Login Screen

Using the generated credentials, enter the generated username in the User field and the generated password in the Password field, then select LOG IN to access the system. NiFi Flow Authenticated Screen

Configuring

The NiFi User Guide describes how to build a data flow.

Stopping

Run the following command to stop NiFi:

laptop:~ myuser$ cd ~/example-nifi-deploy/nifi-*
laptop:nifi-1.0.0-SNAPSHOT myuser$ ./bin/nifi.sh stop

MiNiFi subproject

MiNiFi is a child project effort of Apache NiFi. It is a complementary data collection approach that supplements the core tenets of NiFi in dataflow management, focusing on the collection of data at the source of its creation.

Specific goals for MiNiFi are comprised of:

  • small and lightweight footprint
  • central management of agents
  • generation of data provenance
  • integration with NiFi for follow-on dataflow management and full chain of custody of information

Perspectives of the role of MiNiFi should be from the perspective of the agent acting immediately at, or directly adjacent to, source sensors, systems, or servers.

To run:

  • Change directory to 'minifi-assembly'. In the target directory, there should be a build of minifi.

      $ cd minifi-assembly
      $ ls -lhd target/minifi*
      drwxr-xr-x  3 user  staff   102B Jul  6 13:07 minifi-1.14.0-SNAPSHOT-bin
      -rw-r--r--  1 user  staff    39M Jul  6 13:07 minifi-1.14.0-SNAPSHOT-bin.tar.gz
      -rw-r--r--  1 user  staff    39M Jul  6 13:07 minifi-1.14.0-SNAPSHOT-bin.zip
    
  • For testing ongoing development you could use the already unpacked build present in the directory named "minifi-version-bin", where version is the current project version. To deploy in another location make use of either the tarball or zipfile and unpack them wherever you like. The distribution will be within a common parent directory named for the version.

      $ mkdir ~/example-minifi-deploy
      $ tar xzf target/minifi-*-bin.tar.gz -C ~/example-minifi-deploy
      $ ls -lh ~/example-minifi-deploy/
      total 0
      drwxr-xr-x  10 user  staff   340B Jul 6 01:06 minifi-1.14.0-SNAPSHOT
    

To run MiNiFi:

  • Change directory to the location where you installed MiNiFi and run it.

      $ cd ~/example-minifi-deploy/minifi-*
      $ ./bin/minifi.sh start
    
  • View the logs located in the logs folder $ tail -F ~/example-minifi-deploy/logs/minifi-app.log

  • For help building your first data flow and sending data to a NiFi instance see the System Admin Guide located in the docs folder or making use of the minifi-toolkit, which aids in adapting NiFi templates to MiNiFi YAML configuration file format.

  • If you are testing ongoing development, you will likely want to stop your instance.

      $ cd ~/example-minifi-deploy/minifi-*
      $ ./bin/minifi.sh stop
    

Docker Build

To build:

  • Run a full NiFi build (see above for instructions). Then from the minifi/ subdirectory, execute mvn -P docker clean install. This will run the full build, create a docker image based on it, and run docker-compose integration tests. After it completes successfully, you should have an apacheminifi:${minifi.version} image that can be started with the following command (replacing ${minifi.version} with the current maven version of your branch):
docker run -d -v YOUR_CONFIG.YML:/opt/minifi/minifi-${minifi.version}/conf/config.yml apacheminifi:${minifi.version}

Registry subproject

Registryβ€”a subproject of Apache NiFiβ€”is a complementary application that provides a central location for storage and management of shared resources across one or more instances of NiFi and/or MiNiFi.

Getting Registry Started

  1. Build NiFi (see Getting Started for NiFi )

or

Build only the Registry subproject:

cd nifi/nifi-registry
mvn clean install

If you wish to enable style and license checks, specify the contrib-check profile:

mvn clean install -Pcontrib-check
  1. Start Registry

    cd nifi-registry/nifi-registry-assembly/target/nifi-registry--bin/nifi-registry-/ ./bin/nifi-registry.sh start

Note that the application web server can take a while to load before it is accessible.

  1. Accessing the application web UI

With the default settings, the application UI will be available at http://localhost:18080/nifi-registry

  1. Accessing the application REST API

If you wish to test against the application REST API, you can access the REST API directly. With the default settings, the base URL of the REST API will be at http://localhost:18080/nifi-registry-api. A UI for testing the REST API will be available at http://localhost:18080/nifi-registry-api/swagger/ui.html

  1. Accessing the application logs

Logs will be available in logs/nifi-registry-app.log

Database Testing

In order to ensure that NiFi Registry works correctly against different relational databases, the existing integration tests can be run against different databases by leveraging the Testcontainers framework.

Spring profiles are used to control the DataSource factory that will be made available to the Spring application context. DataSource factories are provided that use the Testcontainers framework to start a Docker container for a given database and create a corresponding DataSource. If no profile is specified then an H2 DataSource will be used by default and no Docker containers are required.

Assuming Docker is running on the system where the build is running, then the following commands can be run:

Target Database Build Command
All supported mvn verify -Ptest-all-dbs
H2 (default) mvn verify
PostgreSQL 9.x mvn verify -Dspring.profiles.active=postgres
PostgreSQL 10.x mvn verify -Dspring.profiles.active=postgres-10
MySQL 5.6 mvn verify -Pcontrib-check -Dspring.profiles.active=mysql-56
MySQL 5.7 mvn verify -Pcontrib-check -Dspring.profiles.active=mysql-57
MySQL 8 mvn verify -Pcontrib-check -Dspring.profiles.active=mysql-8

When one of the Testcontainer profiles is activated, the test output should show logs that indicate a container has been started, such as the following:

2019-05-15 16:14:45.078  INFO 66091 --- [           main] 🐳 [mysql:5.7]                           : Creating container for image: mysql:5.7
2019-05-15 16:14:45.145  INFO 66091 --- [           main] o.t.utility.RegistryAuthLocator          : Credentials not found for host (index.docker.io) when using credential helper/store (docker-credential-osxkeychain)
2019-05-15 16:14:45.646  INFO 66091 --- [           main] 🐳 [mysql:5.7]                           : Starting container with ID: ca85c8c5a1990d2a898fad04c5897ddcdb3a9405e695cc11259f50f2ebe67c5f
2019-05-15 16:14:46.437  INFO 66091 --- [           main] 🐳 [mysql:5.7]                           : Container mysql:5.7 is starting: ca85c8c5a1990d2a898fad04c5897ddcdb3a9405e695cc11259f50f2ebe67c5f
2019-05-15 16:14:46.479  INFO 66091 --- [           main] 🐳 [mysql:5.7]                           : Waiting for database connection to become available at jdbc:mysql://localhost:33051/test?useSSL=false&allowPublicKeyRetrieval=true using query 'SELECT 1'

The Flyway connection should also indicate the given database:

2019-05-15 16:15:02.114  INFO 66091 --- [           main] o.a.n.r.db.CustomFlywayConfiguration     : Determined database type is MYSQL
2019-05-15 16:15:02.115  INFO 66091 --- [           main] o.a.n.r.db.CustomFlywayConfiguration     : Setting migration locations to [classpath:db/migration/common, classpath:db/migration/mysql]
2019-05-15 16:15:02.373  INFO 66091 --- [           main] o.a.n.r.d.CustomFlywayMigrationStrategy  : First time initializing database...
2019-05-15 16:15:02.380  INFO 66091 --- [           main] o.f.c.internal.license.VersionPrinter    : Flyway Community Edition 5.2.1 by Boxfuse
2019-05-15 16:15:02.403  INFO 66091 --- [           main] o.f.c.internal.database.DatabaseFactory  : Database: jdbc:mysql://localhost:33051/test (MySQL 5.7)

For a full list of the available DataSource factories, consult the nifi-registry-test module.

Getting Help

If you have questions, you can reach out to our mailing list: [email protected] (archive). For more interactive discussions, community members can often be found in the following locations:

To submit a feature request or bug report, please file a Jira at https://issues.apache.org/jira/projects/NIFI/issues. If this is a security vulnerability report, please email [email protected] directly and review the Apache NiFi Security Vulnerability Disclosure and Apache Software Foundation Security processes first.

Documentation

See https://nifi.apache.org/ for the latest NiFi documentation.

See https://nifi.apache.org/minifi and https://cwiki.apache.org/confluence/display/MINIFI for the latest MiNiFi-specific documentation.

See https://nifi.apache.org/registry for the latest Registry-specific documentation.

License

Except as otherwise noted this software is licensed under the Apache License, Version 2.0

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

https://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

Export Control

This distribution includes cryptographic software. The country in which you currently reside may have restrictions on the import, possession, use, and/or re-export to another country, of encryption software. BEFORE using any encryption software, please check your country's laws, regulations and policies concerning the import, possession, or use, and re-export of encryption software, to see if this is permitted. See https://www.wassenaar.org/ for more information.

The U.S. Government Department of Commerce, Bureau of Industry and Security (BIS), has classified this software as Export Commodity Control Number (ECCN) 5D002.C.1, which includes information security software using or performing cryptographic functions with asymmetric algorithms. The form and manner of this Apache Software Foundation distribution makes it eligible for export under the License Exception ENC Technology Software Unrestricted (TSU) exception (see the BIS Export Administration Regulations, Section 740.13) for both object code and source code.

The following provides more details on the included cryptographic software:

Apache NiFi uses BouncyCastle, JCraft Inc., and the built-in Java cryptography libraries for SSL, SSH, and the protection of sensitive configuration parameters. See

for more details on each of these libraries cryptography features.

nifi's People

Contributors

alopresto avatar andrewmlim avatar apiri avatar bbende avatar brosander avatar exceptionfactory avatar ijokarumawak avatar jfrazee avatar joewitt avatar jskora avatar jtstorck avatar mans2singh avatar markap14 avatar mattyb149 avatar mcgilman avatar mikethomsen avatar mosermw avatar mtien-apache avatar olegz avatar patricker avatar pvillard31 avatar rfellows avatar scottyaslan avatar thenatog avatar tpalfy avatar trixpan avatar trkurc avatar turcsanyip avatar yolandamdavis avatar zenfenan avatar

nifi's Issues

CVE-2020-7660 (High) detected in serialize-javascript-2.1.2.tgz - autoclosed

CVE-2020-7660 - High Severity Vulnerability

Vulnerable Library - serialize-javascript-2.1.2.tgz

Serialize JavaScript to a superset of JSON that includes regular expressions and functions.

Library home page: https://registry.npmjs.org/serialize-javascript/-/serialize-javascript-2.1.2.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • compression-webpack-plugin-3.0.1.tgz (Root Library)
    • ❌ serialize-javascript-2.1.2.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js".

Publish Date: 2020-06-01

URL: CVE-2020-7660

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7660

Release Date: 2020-06-08

Fix Resolution (serialize-javascript): 3.1.0

Direct dependency fix Resolution (compression-webpack-plugin): 4.0.0


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2021-32804 (High) detected in tar-4.4.8.tgz, tar-2.2.2.tgz - autoclosed

CVE-2021-32804 - High Severity Vulnerability

Vulnerable Libraries - tar-4.4.8.tgz, tar-2.2.2.tgz

tar-4.4.8.tgz

tar for node

Library home page: https://registry.npmjs.org/tar/-/tar-4.4.8.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • webpack-dev-server-3.11.0.tgz (Root Library)
    • chokidar-2.1.8.tgz
      • fsevents-1.2.9.tgz
        • node-pre-gyp-0.12.0.tgz
          • ❌ tar-4.4.8.tgz (Vulnerable Library)
tar-2.2.2.tgz

tar for node

Library home page: https://registry.npmjs.org/tar/-/tar-2.2.2.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • node-sass-4.13.1.tgz (Root Library)
    • node-gyp-3.8.0.tgz
      • ❌ tar-2.2.2.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

The npm package "tar" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the preservePaths flag is not set to true. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example /home/user/.bashrc would turn into home/user/.bashrc. This logic was insufficient when file paths contained repeated path roots such as ////home/user/.bashrc. node-tar would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. ///home/user/.bashrc) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom onentry method which sanitizes the entry.path or a filter method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.

Publish Date: 2021-08-03

URL: CVE-2021-32804

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-3jfq-g458-7qm9

Release Date: 2021-08-03

Fix Resolution (tar): 4.4.14

Direct dependency fix Resolution (webpack-dev-server): 3.11.1

Fix Resolution (tar): 4.4.14

Direct dependency fix Resolution (node-sass): 4.14.0


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2021-23382 (High) detected in postcss-7.0.29.tgz, postcss-7.0.14.tgz - autoclosed

CVE-2021-23382 - High Severity Vulnerability

Vulnerable Libraries - postcss-7.0.29.tgz, postcss-7.0.14.tgz

postcss-7.0.29.tgz

Tool for transforming styles with JS plugins

Library home page: https://registry.npmjs.org/postcss/-/postcss-7.0.29.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • stylelint-13.3.3.tgz (Root Library)
    • ❌ postcss-7.0.29.tgz (Vulnerable Library)
postcss-7.0.14.tgz

Tool for transforming styles with JS plugins

Library home page: https://registry.npmjs.org/postcss/-/postcss-7.0.14.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • css-loader-2.1.1.tgz (Root Library)
    • ❌ postcss-7.0.14.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

The package postcss before 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern /*\s* sourceMappingURL=(.*).

Publish Date: 2021-04-26

URL: CVE-2021-23382

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23382

Release Date: 2021-04-26

Fix Resolution (postcss): 7.0.36

Direct dependency fix Resolution (stylelint): 13.4.0

Fix Resolution (postcss): 7.0.36

Direct dependency fix Resolution (css-loader): 3.0.0


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2020-2934 (Medium) detected in mysql-connector-java-8.0.15.jar - autoclosed

CVE-2020-2934 - Medium Severity Vulnerability

Vulnerable Library - mysql-connector-java-8.0.15.jar

JDBC Type 4 driver for MySQL

Library home page: http://dev.mysql.com/doc/connector-j/en/

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-test/pom.xml

Path to vulnerable library: /r/.m2/repository/mysql/mysql-connector-java/8.0.15/mysql-connector-java-8.0.15.jar

Dependency Hierarchy:

  • ❌ mysql-connector-java-8.0.15.jar (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.19 and prior and 5.1.48 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Connectors. CVSS 3.0 Base Score 5.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L).

Publish Date: 2020-04-15

URL: CVE-2020-2934

CVSS 3 Score Details (5.0)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.oracle.com/security-alerts/cpuapr2020.html

Release Date: 2020-04-15

Fix Resolution: 8.0.20


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2020-7707 (Critical) detected in property-expr-1.5.1.tgz - autoclosed

CVE-2020-7707 - Critical Severity Vulnerability

Vulnerable Library - property-expr-1.5.1.tgz

tiny util for getting and setting deep object props safely

Library home page: https://registry.npmjs.org/property-expr/-/property-expr-1.5.1.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • lint-staged-8.1.7.tgz (Root Library)
    • yup-0.27.0.tgz
      • ❌ property-expr-1.5.1.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

The package property-expr before 2.0.3 are vulnerable to Prototype Pollution via the setter function.

Publish Date: 2020-08-18

URL: CVE-2020-7707

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7707

Release Date: 2020-08-18

Fix Resolution (property-expr): 2.0.3

Direct dependency fix Resolution (lint-staged): 9.0.0


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2018-11694 (High) detected in node-sass-4.13.1.tgz - autoclosed

CVE-2018-11694 - High Severity Vulnerability

Vulnerable Library - node-sass-4.13.1.tgz

Wrapper around libsass

Library home page: https://registry.npmjs.org/node-sass/-/node-sass-4.13.1.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • ❌ node-sass-4.13.1.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

An issue was discovered in LibSass through 3.5.4. A NULL pointer dereference was found in the function Sass::Functions::selector_append which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact.

Publish Date: 2018-06-04

URL: CVE-2018-11694

CVSS 3 Score Details (8.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2018-06-04

Fix Resolution: Fable.Template.Elmish.React - 0.1.6;GR.PageRender.Razor - 1.8.0;MIDIator.WebClient - 1.0.105


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2020-13822 (High) detected in elliptic-6.4.1.tgz - autoclosed

CVE-2020-13822 - High Severity Vulnerability

Vulnerable Library - elliptic-6.4.1.tgz

EC cryptography

Library home page: https://registry.npmjs.org/elliptic/-/elliptic-6.4.1.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • webpack-4.29.6.tgz (Root Library)
    • node-libs-browser-2.2.0.tgz
      • crypto-browserify-3.12.0.tgz
        • browserify-sign-4.0.4.tgz
          • ❌ elliptic-6.4.1.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

The Elliptic package 6.5.2 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature.

Publish Date: 2020-06-04

URL: CVE-2020-13822

CVSS 3 Score Details (7.7)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2020-07-02

Fix Resolution (elliptic): 6.5.3

Direct dependency fix Resolution (webpack): 4.30.0


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2021-23386 (Medium) detected in dns-packet-1.3.1.tgz - autoclosed

CVE-2021-23386 - Medium Severity Vulnerability

Vulnerable Library - dns-packet-1.3.1.tgz

An abstract-encoding compliant module for encoding / decoding DNS packets

Library home page: https://registry.npmjs.org/dns-packet/-/dns-packet-1.3.1.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • webpack-dev-server-3.11.0.tgz (Root Library)
    • bonjour-3.5.0.tgz
      • multicast-dns-6.2.3.tgz
        • ❌ dns-packet-1.3.1.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

This affects the package dns-packet before 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.

Publish Date: 2021-05-20

URL: CVE-2021-23386

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23386

Release Date: 2021-05-20

Fix Resolution (dns-packet): 1.3.2

Direct dependency fix Resolution (webpack-dev-server): 3.11.1


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2021-23413 (Medium) detected in jszip-3.1.5.tgz - autoclosed

CVE-2021-23413 - Medium Severity Vulnerability

Vulnerable Library - jszip-3.1.5.tgz

Create, read and edit .zip files with JavaScript http://stuartk.com/jszip

Library home page: https://registry.npmjs.org/jszip/-/jszip-3.1.5.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • protractor-5.4.0.tgz (Root Library)
    • selenium-webdriver-3.6.0.tgz
      • ❌ jszip-3.1.5.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

This affects the package jszip before 3.7.0. Crafting a new zip file with filenames set to Object prototype values (e.g proto, toString, etc) results in a returned object with a modified prototype instance.

Publish Date: 2021-07-25

URL: CVE-2021-23413

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23413

Release Date: 2021-07-25

Fix Resolution (jszip): 3.7.0

Direct dependency fix Resolution (protractor): 5.4.1


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2020-13955 (Medium) detected in calcite-core-1.21.0.jar - autoclosed

CVE-2020-13955 - Medium Severity Vulnerability

Vulnerable Library - calcite-core-1.21.0.jar

Core Calcite APIs and engine.

Path to dependency file: /nifi-nar-bundles/nifi-sql-reporting-bundle/nifi-sql-reporting-tasks/pom.xml

Path to vulnerable library: /812183939_HVCZJO/downloadResource_PPNSGT/20210812184321/calcite-core-1.21.0.jar

Dependency Hierarchy:

  • ❌ calcite-core-1.21.0.jar (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses internally this method to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters. The method itself is in a utility class so people may use it to create vulnerable HTTPS connections for other applications. From Apache Calcite 1.26 onwards, the hostname verification will be performed using the default JVM truststore.

Publish Date: 2020-10-09

URL: CVE-2020-13955

CVSS 3 Score Details (5.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2020-10-09

Fix Resolution: 1.26.0


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2020-28481 (Medium) detected in socket.io-2.1.1.tgz - autoclosed

CVE-2020-28481 - Medium Severity Vulnerability

Vulnerable Library - socket.io-2.1.1.tgz

node.js realtime framework server

Library home page: https://registry.npmjs.org/socket.io/-/socket.io-2.1.1.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • karma-5.0.4.tgz (Root Library)
    • ❌ socket.io-2.1.1.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

The package socket.io before 2.4.0 are vulnerable to Insecure Defaults due to CORS Misconfiguration. All domains are whitelisted by default.

Publish Date: 2021-01-19

URL: CVE-2020-28481

CVSS 3 Score Details (4.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28481

Release Date: 2021-01-19

Fix Resolution (socket.io): 2.4.0

Direct dependency fix Resolution (karma): 5.0.8


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2017-7686 (High) detected in ignite-core-1.6.0.jar - autoclosed

CVE-2017-7686 - High Severity Vulnerability

Vulnerable Library - ignite-core-1.6.0.jar

Java-based middleware for in-memory processing of big data in a distributed environment.

Path to dependency file: /nifi-nar-bundles/nifi-ignite-bundle/nifi-ignite-processors/pom.xml

Path to vulnerable library: /812183939_HVCZJO/downloadResource_PPNSGT/20210812184331/ignite-core-1.6.0.jar

Dependency Hierarchy:

  • ❌ ignite-core-1.6.0.jar (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

Apache Ignite 1.0.0-RC3 to 2.0 uses an update notifier component to update the users about new project releases that include additional functionality, bug fixes and performance improvements. To do that the component communicates to an external PHP server (http://ignite.run) where it needs to send some system properties like Apache Ignite or Java version. Some of the properties might contain user sensitive information.

Publish Date: 2017-06-28

URL: CVE-2017-7686

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: http://apache-ignite-developers.2346864.n4.nabble.com/CVE-2017-7686-Apache-Ignite-Information-Disclosure-td19168.html

Release Date: 2017-06-28

Fix Resolution: 2.1.0


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2021-3664 (Medium) detected in url-parse-1.4.7.tgz - autoclosed

CVE-2021-3664 - Medium Severity Vulnerability

Vulnerable Library - url-parse-1.4.7.tgz

Small footprint URL parser that works seamlessly across Node.js and browser environments

Library home page: https://registry.npmjs.org/url-parse/-/url-parse-1.4.7.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • webpack-dev-server-3.11.0.tgz (Root Library)
    • sockjs-client-1.4.0.tgz
      • ❌ url-parse-1.4.7.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

url-parse is vulnerable to URL Redirection to Untrusted Site

Publish Date: 2021-07-26

URL: CVE-2021-3664

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3664

Release Date: 2021-07-26

Fix Resolution (url-parse): 1.5.2

Direct dependency fix Resolution (webpack-dev-server): 3.11.1


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2020-24025 (Medium) detected in node-sass-4.13.1.tgz - autoclosed

CVE-2020-24025 - Medium Severity Vulnerability

Vulnerable Library - node-sass-4.13.1.tgz

Wrapper around libsass

Library home page: https://registry.npmjs.org/node-sass/-/node-sass-4.13.1.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • ❌ node-sass-4.13.1.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

Certificate validation in node-sass 2.0.0 to 4.14.1 is disabled when requesting binaries even if the user is not specifying an alternative download path.

Publish Date: 2021-01-11

URL: CVE-2020-24025

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-r8f7-9pfq-mjmv

Release Date: 2021-01-11

Fix Resolution: 7.0.0


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2019-11358 (Medium) detected in multiple libraries - autoclosed

CVE-2019-11358 - Medium Severity Vulnerability

Vulnerable Libraries - jquery-1.10.2.min.js, jquery-1.12.4.js, jquery-3.1.1.min.js

jquery-1.10.2.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js

Path to dependency file: /nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-web/nifi-web-ui/src/main/frontend/node_modules/jquery-minicolors/without-bootstrap.html

Path to vulnerable library: /main/frontend/node_modules/jquery-minicolors/without-bootstrap.html

Dependency Hierarchy:

  • ❌ jquery-1.10.2.min.js (Vulnerable Library)
jquery-1.12.4.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.12.4/jquery.js

Path to dependency file: /nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-web/nifi-web-ui/src/main/frontend/node_modules/jquery-ui/demos/effect/removeClass.html

Path to vulnerable library: /main/frontend/node_modules/jquery-ui/demos/effect/../../external/jquery/jquery.js,/main/frontend/node_modules/jquery-ui-dist/external/jquery/jquery.js,/main/frontend/node_modules/jquery-ui/demos/slider/../../external/jquery/jquery.js

Dependency Hierarchy:

  • ❌ jquery-1.12.4.js (Vulnerable Library)
jquery-3.1.1.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/3.1.1/jquery.min.js

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-docs/src/main/webapp/js/jquery.min.js

Dependency Hierarchy:

  • ❌ jquery-3.1.1.min.js (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable proto property, it could extend the native Object.prototype.

Publish Date: 2019-04-20

URL: CVE-2019-11358

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358

Release Date: 2019-04-20

Fix Resolution: jquery - 3.4.0

CVE-2018-11697 (Medium) detected in node-sass-4.13.1.tgz - autoclosed

CVE-2018-11697 - Medium Severity Vulnerability

Vulnerable Library - node-sass-4.13.1.tgz

Wrapper around libsass

Library home page: https://registry.npmjs.org/node-sass/-/node-sass-4.13.1.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • ❌ node-sass-4.13.1.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

An issue was discovered in LibSass through 3.5.4. An out-of-bounds read of a memory region was found in the function Sass::Prelexer::exactly() which could be leveraged by an attacker to disclose information or manipulated to read from unmapped memory causing a denial of service.

Publish Date: 2018-06-04

URL: CVE-2018-11697

CVSS 3 Score Details (5.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2018-06-04

Fix Resolution: 4.14.0


⛑️ Automatic Remediation will be attempted for this issue.

WS-2021-0039 (Low) detected in core-8.1.1.tgz - autoclosed

WS-2021-0039 - Low Severity Vulnerability

Vulnerable Library - core-8.1.1.tgz

Angular - the core framework

Library home page: https://registry.npmjs.org/@angular/core/-/core-8.1.1.tgz

Dependency Hierarchy:

  • ❌ core-8.1.1.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

Cross-Site Scripting (XSS) vulnerability was found in @angular/core before 11.1.1. HTML doesn't specify any way to escape comment end text inside the comment.

Publish Date: 2021-01-26

URL: WS-2021-0039

CVSS 3 Score Details (3.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: High
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/angular/angular/releases/tag/11.1.1

Release Date: 2021-01-26

Fix Resolution: @angular/core - 11.1.1


  • Check this box to open an automated fix PR

CVE-2020-28498 (Medium) detected in elliptic-6.4.1.tgz - autoclosed

CVE-2020-28498 - Medium Severity Vulnerability

Vulnerable Library - elliptic-6.4.1.tgz

EC cryptography

Library home page: https://registry.npmjs.org/elliptic/-/elliptic-6.4.1.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • webpack-4.29.6.tgz (Root Library)
    • node-libs-browser-2.2.0.tgz
      • crypto-browserify-3.12.0.tgz
        • browserify-sign-4.0.4.tgz
          • ❌ elliptic-6.4.1.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

The package elliptic before 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.

Publish Date: 2021-02-02

URL: CVE-2020-28498

CVSS 3 Score Details (6.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2020-28498

Release Date: 2021-02-02

Fix Resolution (elliptic): 6.5.4

Direct dependency fix Resolution (webpack): 4.30.0


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2019-2692 (Medium) detected in mysql-connector-java-8.0.15.jar - autoclosed

CVE-2019-2692 - Medium Severity Vulnerability

Vulnerable Library - mysql-connector-java-8.0.15.jar

JDBC Type 4 driver for MySQL

Library home page: http://dev.mysql.com/doc/connector-j/en/

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-test/pom.xml

Path to vulnerable library: /r/.m2/repository/mysql/mysql-connector-java/8.0.15/mysql-connector-java-8.0.15.jar

Dependency Hierarchy:

  • ❌ mysql-connector-java-8.0.15.jar (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).

Publish Date: 2019-04-23

URL: CVE-2019-2692

CVSS 3 Score Details (5.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-jcq3-cprp-m333

Release Date: 2019-04-23

Fix Resolution: 8.0.16


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2021-27292 (High) detected in ua-parser-js-0.7.21.tgz - autoclosed

CVE-2021-27292 - High Severity Vulnerability

Vulnerable Library - ua-parser-js-0.7.21.tgz

Lightweight JavaScript-based user-agent string parser

Library home page: https://registry.npmjs.org/ua-parser-js/-/ua-parser-js-0.7.21.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • karma-5.0.4.tgz (Root Library)
    • ❌ ua-parser-js-0.7.21.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.

Publish Date: 2021-03-17

URL: CVE-2021-27292

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2021-03-17

Fix Resolution (ua-parser-js): 0.7.25

Direct dependency fix Resolution (karma): 6.0.0


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2021-31597 (Critical) detected in xmlhttprequest-ssl-1.5.5.tgz - autoclosed

CVE-2021-31597 - Critical Severity Vulnerability

Vulnerable Library - xmlhttprequest-ssl-1.5.5.tgz

XMLHttpRequest for Node

Library home page: https://registry.npmjs.org/xmlhttprequest-ssl/-/xmlhttprequest-ssl-1.5.5.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • karma-5.0.4.tgz (Root Library)
    • socket.io-2.1.1.tgz
      • socket.io-client-2.1.1.tgz
        • engine.io-client-3.2.1.tgz
          • ❌ xmlhttprequest-ssl-1.5.5.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

The xmlhttprequest-ssl package before 1.6.1 for Node.js disables SSL certificate validation by default, because rejectUnauthorized (when the property exists but is undefined) is considered to be false within the https.request function of Node.js. In other words, no certificate is ever rejected.

Publish Date: 2021-04-23

URL: CVE-2021-31597

CVSS 3 Score Details (9.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31597

Release Date: 2021-04-23

Fix Resolution (xmlhttprequest-ssl): 1.6.1

Direct dependency fix Resolution (karma): 5.0.8


⛑️ Automatic Remediation will be attempted for this issue.

WS-2019-0379 (Medium) detected in commons-codec-1.12.jar - autoclosed

WS-2019-0379 - Medium Severity Vulnerability

Vulnerable Library - commons-codec-1.12.jar

The Apache Commons Codec package contains simple encoder and decoders for various formats such as Base64 and Hexadecimal. In addition to these widely used encoders and decoders, the codec package also maintains a collection of phonetic encoding utilities.

Library home page: http://commons.apache.org/proper/commons-codec/

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-framework/pom.xml

Path to vulnerable library: /812183939_HVCZJO/downloadResource_PPNSGT/20210812184306/commons-codec-1.12.jar

Dependency Hierarchy:

  • ❌ commons-codec-1.12.jar (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

Apache commons-codec before version β€œcommons-codec-1.13-RC1” is vulnerable to information disclosure due to Improper Input validation.

Publish Date: 2019-05-20

URL: WS-2019-0379

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2019-05-20

Fix Resolution: 1.13


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2018-20677 (Medium) detected in bootstrap-3.3.1.min.js - autoclosed

CVE-2018-20677 - Medium Severity Vulnerability

Vulnerable Library - bootstrap-3.3.1.min.js

The most popular front-end framework for developing responsive, mobile first projects on the web.

Library home page: https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.1/js/bootstrap.min.js

Path to dependency file: /nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-web/nifi-web-ui/src/main/frontend/node_modules/jquery-minicolors/index.html

Path to vulnerable library: /main/frontend/node_modules/jquery-minicolors/index.html

Dependency Hierarchy:

  • ❌ bootstrap-3.3.1.min.js (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.

Publish Date: 2019-01-09

URL: CVE-2018-20677

CVSS 3 Score Details (5.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677

Release Date: 2019-01-09

Fix Resolution: Bootstrap - v3.4.0;NorDroN.AngularTemplate - 0.1.6;Dynamic.NET.Express.ProjectTemplates - 0.8.0;dotnetng.template - 1.0.0.4;ZNxtApp.Core.Module.Theme - 1.0.9-Beta;JMeter - 5.0.0

CVE-2021-23343 (High) detected in path-parse-1.0.6.tgz - autoclosed

CVE-2021-23343 - High Severity Vulnerability

Vulnerable Library - path-parse-1.0.6.tgz

Node.js path.parse() ponyfill

Library home page: https://registry.npmjs.org/path-parse/-/path-parse-1.0.6.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • core-7.4.4.tgz (Root Library)
    • resolve-1.10.1.tgz
      • ❌ path-parse-1.0.6.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.

Publish Date: 2021-05-04

URL: CVE-2021-23343

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2021-05-04

Fix Resolution (path-parse): 1.0.7

Direct dependency fix Resolution (@babel/core): 7.4.5


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2018-11696 (High) detected in node-sass-4.13.1.tgz - autoclosed

CVE-2018-11696 - High Severity Vulnerability

Vulnerable Library - node-sass-4.13.1.tgz

Wrapper around libsass

Library home page: https://registry.npmjs.org/node-sass/-/node-sass-4.13.1.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • ❌ node-sass-4.13.1.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

An issue was discovered in LibSass through 3.5.4. A NULL pointer dereference was found in the function Sass::Inspect::operator which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact.

Publish Date: 2018-06-04

URL: CVE-2018-11696

CVSS 3 Score Details (8.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2018-06-04

Fix Resolution: 4.14.0


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2020-13956 (Medium) detected in multiple libraries - autoclosed

CVE-2020-13956 - Medium Severity Vulnerability

Vulnerable Libraries - httpclient-4.5.6.jar, httpclient-4.5.5.jar, httpclient-4.5.7.jar

httpclient-4.5.6.jar

Apache HttpComponents Client

Path to dependency file: /nifi-commons/nifi-web-utils/pom.xml

Path to vulnerable library: /r/.m2/repository/org/apache/httpcomponents/httpclient/4.5.6/httpclient-4.5.6.jar

Dependency Hierarchy:

  • ❌ httpclient-4.5.6.jar (Vulnerable Library)
httpclient-4.5.5.jar

Apache HttpComponents Client

Dependency Hierarchy:

  • ❌ httpclient-4.5.5.jar (Vulnerable Library)
httpclient-4.5.7.jar

Apache HttpComponents Client

Library home page: http://hc.apache.org/

Path to dependency file: /nifi-nar-bundles/nifi-slack-bundle/nifi-slack-processors/pom.xml

Path to vulnerable library: /812183939_HVCZJO/downloadResource_PPNSGT/20210812184226/httpclient-4.5.7.jar

Dependency Hierarchy:

  • ❌ httpclient-4.5.7.jar (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.

Publish Date: 2020-12-02

URL: CVE-2020-13956

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-13956

Release Date: 2020-12-02

Fix Resolution: 4.5.13


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2018-3824 (Medium) detected in elasticsearch-2.1.0.jar - autoclosed

CVE-2018-3824 - Medium Severity Vulnerability

Vulnerable Library - elasticsearch-2.1.0.jar

Elasticsearch - Open Source, Distributed, RESTful Search Engine

Library home page: http://nexus.sonatype.org/oss-repository-hosting.html/parent/elasticsearch

Path to dependency file: /nifi-nar-bundles/nifi-elasticsearch-bundle/nifi-elasticsearch-processors/pom.xml

Path to vulnerable library: /812183939_HVCZJO/downloadResource_PPNSGT/20210812184232/elasticsearch-2.1.0.jar

Dependency Hierarchy:

  • ❌ elasticsearch-2.1.0.jar (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

X-Pack Machine Learning versions before 6.2.4 and 5.6.9 had a cross-site scripting (XSS) vulnerability. If an attacker is able to inject data into an index that has a ML job running against it, then when another user views the results of the ML job it could allow the attacker to obtain sensitive information from or perform destructive actions on behalf of that other ML user.

Publish Date: 2018-09-19

URL: CVE-2018-3824

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3824

Release Date: 2018-09-19

Fix Resolution: 5.6.9


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2021-27290 (High) detected in ssri-6.0.1.tgz, ssri-7.1.0.tgz - autoclosed

CVE-2021-27290 - High Severity Vulnerability

Vulnerable Libraries - ssri-6.0.1.tgz, ssri-7.1.0.tgz

ssri-6.0.1.tgz

Standard Subresource Integrity library -- parses, serializes, generates, and verifies integrity metadata according to the SRI spec.

Library home page: https://registry.npmjs.org/ssri/-/ssri-6.0.1.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • webpack-4.29.6.tgz (Root Library)
    • terser-webpack-plugin-1.4.3.tgz
      • cacache-12.0.3.tgz
        • ❌ ssri-6.0.1.tgz (Vulnerable Library)
ssri-7.1.0.tgz

Standard Subresource Integrity library -- parses, serializes, generates, and verifies integrity metadata according to the SRI spec.

Library home page: https://registry.npmjs.org/ssri/-/ssri-7.1.0.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • compression-webpack-plugin-3.0.1.tgz (Root Library)
    • cacache-13.0.1.tgz
      • ❌ ssri-7.1.0.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.

Publish Date: 2021-03-12

URL: CVE-2021-27290

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-vx3p-948g-6vhq

Release Date: 2021-03-12

Fix Resolution (ssri): 6.0.2

Direct dependency fix Resolution (webpack): 4.30.0

Fix Resolution (ssri): 6.0.2

Direct dependency fix Resolution (compression-webpack-plugin): 3.1.0


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2020-7020 (Low) detected in elasticsearch-5.6.16.jar, elasticsearch-2.1.0.jar - autoclosed

CVE-2020-7020 - Low Severity Vulnerability

Vulnerable Libraries - elasticsearch-5.6.16.jar, elasticsearch-2.1.0.jar

elasticsearch-5.6.16.jar

Elasticsearch subproject :core

Library home page: https://github.com/elastic/elasticsearch

Path to dependency file: /nifi-nar-bundles/nifi-elasticsearch-bundle/nifi-elasticsearch-client-service/pom.xml

Path to vulnerable library: /812183939_HVCZJO/downloadResource_PPNSGT/20210812184329/elasticsearch-5.6.16.jar

Dependency Hierarchy:

  • ❌ elasticsearch-5.6.16.jar (Vulnerable Library)
elasticsearch-2.1.0.jar

Elasticsearch - Open Source, Distributed, RESTful Search Engine

Library home page: http://nexus.sonatype.org/oss-repository-hosting.html/parent/elasticsearch

Path to dependency file: /nifi-nar-bundles/nifi-elasticsearch-bundle/nifi-elasticsearch-processors/pom.xml

Path to vulnerable library: /812183939_HVCZJO/downloadResource_PPNSGT/20210812184232/elasticsearch-2.1.0.jar

Dependency Hierarchy:

  • ❌ elasticsearch-2.1.0.jar (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

Elasticsearch versions before 6.8.13 and 7.9.2 contain a document disclosure flaw when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain complex queries. This could result in the search disclosing the existence of documents the attacker should not be able to view. This could result in an attacker gaining additional insight into potentially sensitive indices.

Publish Date: 2020-10-22

URL: CVE-2020-7020

CVSS 3 Score Details (3.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://discuss.elastic.co/t/elastic-stack-7-9-3-and-6-8-13-security-update/253033

Release Date: 2020-10-22

Fix Resolution: 6.8.13


  • Check this box to open an automated fix PR

CVE-2020-7021 (Medium) detected in elasticsearch-2.1.0.jar, elasticsearch-5.6.16.jar - autoclosed

CVE-2020-7021 - Medium Severity Vulnerability

Vulnerable Libraries - elasticsearch-2.1.0.jar, elasticsearch-5.6.16.jar

elasticsearch-2.1.0.jar

Elasticsearch - Open Source, Distributed, RESTful Search Engine

Library home page: http://nexus.sonatype.org/oss-repository-hosting.html/parent/elasticsearch

Path to dependency file: /nifi-nar-bundles/nifi-elasticsearch-bundle/nifi-elasticsearch-processors/pom.xml

Path to vulnerable library: /812183939_HVCZJO/downloadResource_PPNSGT/20210812184232/elasticsearch-2.1.0.jar

Dependency Hierarchy:

  • ❌ elasticsearch-2.1.0.jar (Vulnerable Library)
elasticsearch-5.6.16.jar

Elasticsearch subproject :core

Library home page: https://github.com/elastic/elasticsearch

Path to dependency file: /nifi-nar-bundles/nifi-elasticsearch-bundle/nifi-elasticsearch-client-service/pom.xml

Path to vulnerable library: /812183939_HVCZJO/downloadResource_PPNSGT/20210812184329/elasticsearch-5.6.16.jar

Dependency Hierarchy:

  • ❌ elasticsearch-5.6.16.jar (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

Elasticsearch versions before 7.10.0 and 6.8.14 have an information disclosure issue when audit logging and the emit_request_body option is enabled. The Elasticsearch audit log could contain sensitive information such as password hashes or authentication tokens. This could allow an Elasticsearch administrator to view these details.

Publish Date: 2021-02-10

URL: CVE-2020-7021

CVSS 3 Score Details (4.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: High
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://discuss.elastic.co/t/elastic-stack-7-11-0-and-6-8-14-security-update/263915

Release Date: 2021-02-10

Fix Resolution: 6.8.14


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2020-7774 (Critical) detected in y18n-4.0.0.tgz, y18n-3.2.1.tgz - autoclosed

CVE-2020-7774 - Critical Severity Vulnerability

Vulnerable Libraries - y18n-4.0.0.tgz, y18n-3.2.1.tgz

y18n-4.0.0.tgz

the bare-bones internationalization library used by yargs

Library home page: https://registry.npmjs.org/y18n/-/y18n-4.0.0.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • webpack-dev-server-3.11.0.tgz (Root Library)
    • yargs-13.3.2.tgz
      • ❌ y18n-4.0.0.tgz (Vulnerable Library)
y18n-3.2.1.tgz

the bare-bones internationalization library used by yargs

Library home page: https://registry.npmjs.org/y18n/-/y18n-3.2.1.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • node-sass-4.13.1.tgz (Root Library)
    • sass-graph-2.2.6.tgz
      • yargs-7.1.0.tgz
        • ❌ y18n-3.2.1.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

The package y18n before 3.2.2, 4.0.1 and 5.0.5, is vulnerable to Prototype Pollution.

Publish Date: 2020-11-17

URL: CVE-2020-7774

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/advisories/1654

Release Date: 2020-11-17

Fix Resolution (y18n): 4.0.1

Direct dependency fix Resolution (webpack-dev-server): 3.11.1

Fix Resolution (y18n): 4.0.1

Direct dependency fix Resolution (node-sass): 4.14.0


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2020-7788 (Critical) detected in ini-1.3.5.tgz - autoclosed

CVE-2020-7788 - Critical Severity Vulnerability

Vulnerable Library - ini-1.3.5.tgz

An ini encoder/decoder for node

Library home page: https://registry.npmjs.org/ini/-/ini-1.3.5.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • webpack-dev-server-3.11.0.tgz (Root Library)
    • chokidar-2.1.8.tgz
      • fsevents-1.2.9.tgz
        • node-pre-gyp-0.12.0.tgz
          • rc-1.2.7.tgz
            • ❌ ini-1.3.5.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.

Publish Date: 2020-12-11

URL: CVE-2020-7788

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788

Release Date: 2020-12-11

Fix Resolution (ini): 1.3.6

Direct dependency fix Resolution (webpack-dev-server): 3.11.1


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2020-11023 (Medium) detected in multiple libraries - autoclosed

CVE-2020-11023 - Medium Severity Vulnerability

Vulnerable Libraries - jquery-1.12.4.js, jquery-1.10.2.min.js, jquery-3.1.1.min.js

jquery-1.12.4.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.12.4/jquery.js

Path to dependency file: /nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-web/nifi-web-ui/src/main/frontend/node_modules/jquery-ui/demos/effect/removeClass.html

Path to vulnerable library: /main/frontend/node_modules/jquery-ui/demos/effect/../../external/jquery/jquery.js,/main/frontend/node_modules/jquery-ui-dist/external/jquery/jquery.js,/main/frontend/node_modules/jquery-ui/demos/slider/../../external/jquery/jquery.js

Dependency Hierarchy:

  • ❌ jquery-1.12.4.js (Vulnerable Library)
jquery-1.10.2.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js

Path to dependency file: /nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-web/nifi-web-ui/src/main/frontend/node_modules/jquery-minicolors/without-bootstrap.html

Path to vulnerable library: /main/frontend/node_modules/jquery-minicolors/without-bootstrap.html

Dependency Hierarchy:

  • ❌ jquery-1.10.2.min.js (Vulnerable Library)
jquery-3.1.1.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/3.1.1/jquery.min.js

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-docs/src/main/webapp/js/jquery.min.js

Dependency Hierarchy:

  • ❌ jquery-3.1.1.min.js (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

Publish Date: 2020-04-29

URL: CVE-2020-11023

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440

Release Date: 2020-04-29

Fix Resolution: jquery - 3.5.0;jquery-rails - 4.4.0

CVE-2021-32640 (Medium) detected in ws-6.2.1.tgz - autoclosed

CVE-2021-32640 - Medium Severity Vulnerability

Vulnerable Library - ws-6.2.1.tgz

Simple to use, blazing fast and thoroughly tested websocket client and server for Node.js

Library home page: https://registry.npmjs.org/ws/-/ws-6.2.1.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • webpack-dev-server-3.11.0.tgz (Root Library)
    • ❌ ws-6.2.1.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

ws is an open source WebSocket client and server library for Node.js. A specially crafted value of the Sec-Websocket-Protocol header can be used to significantly slow down a ws server. The vulnerability has been fixed in [email protected] (websockets/ws@00c425e). In vulnerable versions of ws, the issue can be mitigated by reducing the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options.

Publish Date: 2021-05-25

URL: CVE-2021-32640

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-6fc8-4gx4-v693

Release Date: 2021-05-25

Fix Resolution (ws): 6.2.2

Direct dependency fix Resolution (webpack-dev-server): 3.11.1


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2019-8331 (Medium) detected in bootstrap-3.3.1.min.js - autoclosed

CVE-2019-8331 - Medium Severity Vulnerability

Vulnerable Library - bootstrap-3.3.1.min.js

The most popular front-end framework for developing responsive, mobile first projects on the web.

Library home page: https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.1/js/bootstrap.min.js

Path to dependency file: /nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-web/nifi-web-ui/src/main/frontend/node_modules/jquery-minicolors/index.html

Path to vulnerable library: /main/frontend/node_modules/jquery-minicolors/index.html

Dependency Hierarchy:

  • ❌ bootstrap-3.3.1.min.js (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.

Publish Date: 2019-02-20

URL: CVE-2019-8331

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2019-02-20

Fix Resolution: bootstrap - 3.4.1,4.3.1;bootstrap-sass - 3.4.1,4.3.1

CVE-2018-3823 (Medium) detected in elasticsearch-2.1.0.jar - autoclosed

CVE-2018-3823 - Medium Severity Vulnerability

Vulnerable Library - elasticsearch-2.1.0.jar

Elasticsearch - Open Source, Distributed, RESTful Search Engine

Library home page: http://nexus.sonatype.org/oss-repository-hosting.html/parent/elasticsearch

Path to dependency file: /nifi-nar-bundles/nifi-elasticsearch-bundle/nifi-elasticsearch-processors/pom.xml

Path to vulnerable library: /812183939_HVCZJO/downloadResource_PPNSGT/20210812184232/elasticsearch-2.1.0.jar

Dependency Hierarchy:

  • ❌ elasticsearch-2.1.0.jar (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

X-Pack Machine Learning versions before 6.2.4 and 5.6.9 had a cross-site scripting (XSS) vulnerability. Users with manage_ml permissions could create jobs containing malicious data as part of their configuration that could allow the attacker to obtain sensitive information from or perform destructive actions on behalf of other ML users viewing the results of the jobs.

Publish Date: 2018-09-19

URL: CVE-2018-3823

CVSS 3 Score Details (5.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://discuss.elastic.co/t/elastic-stack-6-2-4-and-5-6-9-security-update/128422

Release Date: 2018-09-19

Fix Resolution: 5.6.9


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2020-8908 (Low) detected in guava-28.0-jre.jar, guava-27.0.1-jre.jar - autoclosed

CVE-2020-8908 - Low Severity Vulnerability

Vulnerable Libraries - guava-28.0-jre.jar, guava-27.0.1-jre.jar

guava-28.0-jre.jar

Guava is a suite of core and expanded libraries that include utility classes, google's collections, io classes, and much much more.

Library home page: https://github.com/google/guava

Path to dependency file: /nifi-nar-bundles/nifi-enrich-bundle/nifi-enrich-processors/pom.xml

Path to vulnerable library: /r/.m2/repository/com/google/guava/guava/28.0-jre/guava-28.0-jre.jar,/r/.m2/repository/com/google/guava/guava/28.0-jre/guava-28.0-jre.jar,/r/.m2/repository/com/google/guava/guava/28.0-jre/guava-28.0-jre.jar,/r/.m2/repository/com/google/guava/guava/28.0-jre/guava-28.0-jre.jar,/r/.m2/repository/com/google/guava/guava/28.0-jre/guava-28.0-jre.jar,/r/.m2/repository/com/google/guava/guava/28.0-jre/guava-28.0-jre.jar

Dependency Hierarchy:

  • ❌ guava-28.0-jre.jar (Vulnerable Library)
guava-27.0.1-jre.jar

Guava is a suite of core and expanded libraries that include utility classes, google's collections, io classes, and much much more.

Library home page: https://github.com/google/guava

Path to dependency file: /nifi-nar-bundles/nifi-standard-services/nifi-record-serialization-services-bundle/nifi-record-serialization-services/pom.xml

Path to vulnerable library: /r/.m2/repository/com/google/guava/guava/27.0.1-jre/guava-27.0.1-jre.jar,/r/.m2/repository/com/google/guava/guava/27.0.1-jre/guava-27.0.1-jre.jar,/r/.m2/repository/com/google/guava/guava/27.0.1-jre/guava-27.0.1-jre.jar

Dependency Hierarchy:

  • ❌ guava-27.0.1-jre.jar (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured.

Publish Date: 2020-12-10

URL: CVE-2020-8908

CVSS 3 Score Details (3.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2020-8908

Release Date: 2020-12-10

Fix Resolution: 30.0-android


  • Check this box to open an automated fix PR

CVE-2020-7733 (High) detected in ua-parser-js-0.7.21.tgz - autoclosed

CVE-2020-7733 - High Severity Vulnerability

Vulnerable Library - ua-parser-js-0.7.21.tgz

Lightweight JavaScript-based user-agent string parser

Library home page: https://registry.npmjs.org/ua-parser-js/-/ua-parser-js-0.7.21.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • karma-5.0.4.tgz (Root Library)
    • ❌ ua-parser-js-0.7.21.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA.

Publish Date: 2020-09-16

URL: CVE-2020-7733

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2020-09-16

Fix Resolution (ua-parser-js): 0.7.22

Direct dependency fix Resolution (karma): 5.2.3


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2018-20676 (Medium) detected in bootstrap-3.3.1.min.js - autoclosed

CVE-2018-20676 - Medium Severity Vulnerability

Vulnerable Library - bootstrap-3.3.1.min.js

The most popular front-end framework for developing responsive, mobile first projects on the web.

Library home page: https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.1/js/bootstrap.min.js

Path to dependency file: /nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-web/nifi-web-ui/src/main/frontend/node_modules/jquery-minicolors/index.html

Path to vulnerable library: /main/frontend/node_modules/jquery-minicolors/index.html

Dependency Hierarchy:

  • ❌ bootstrap-3.3.1.min.js (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.

Publish Date: 2019-01-09

URL: CVE-2018-20676

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20676

Release Date: 2019-01-09

Fix Resolution: bootstrap - 3.4.0

CVE-2020-8116 (High) detected in dot-prop-4.2.0.tgz - autoclosed

CVE-2020-8116 - High Severity Vulnerability

Vulnerable Library - dot-prop-4.2.0.tgz

Get, set, or delete a property from a nested object using a dot path

Library home page: https://registry.npmjs.org/dot-prop/-/dot-prop-4.2.0.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • optimize-css-assets-webpack-plugin-5.0.1.tgz (Root Library)
    • cssnano-4.1.10.tgz
      • cssnano-preset-default-4.0.7.tgz
        • postcss-merge-rules-4.0.3.tgz
          • postcss-selector-parser-3.1.1.tgz
            • ❌ dot-prop-4.2.0.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.

Publish Date: 2020-02-04

URL: CVE-2020-8116

CVSS 3 Score Details (7.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8116

Release Date: 2020-02-04

Fix Resolution (dot-prop): 4.2.1

Direct dependency fix Resolution (optimize-css-assets-webpack-plugin): 5.0.2


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2020-28500 (Medium) detected in lodash-4.17.18.tgz - autoclosed

CVE-2020-28500 - Medium Severity Vulnerability

Vulnerable Library - lodash-4.17.18.tgz

Lodash modular utilities.

Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.18.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • core-7.4.4.tgz (Root Library)
    • ❌ lodash-4.17.18.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.
Mend Note: After conducting further research, Mend has determined that CVE-2020-28500 only affects environments with versions 4.0.0 to 4.17.20 of Lodash.

Publish Date: 2021-02-15

URL: CVE-2020-28500

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500

Release Date: 2021-02-15

Fix Resolution (lodash): 4.17.21

Direct dependency fix Resolution (@babel/core): 7.4.5


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2021-33587 (High) detected in css-what-3.2.1.tgz - autoclosed

CVE-2021-33587 - High Severity Vulnerability

Vulnerable Library - css-what-3.2.1.tgz

a CSS selector parser

Library home page: https://registry.npmjs.org/css-what/-/css-what-3.2.1.tgz

Dependency Hierarchy:

  • optimize-css-assets-webpack-plugin-5.0.1.tgz (Root Library)
    • cssnano-4.1.10.tgz
      • cssnano-preset-default-4.0.7.tgz
        • postcss-svgo-4.0.2.tgz
          • svgo-1.3.2.tgz
            • css-select-2.1.0.tgz
              • ❌ css-what-3.2.1.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

The css-what package 4.0.0 through 5.0.0 for Node.js does not ensure that attribute parsing has Linear Time Complexity relative to the size of the input.

Publish Date: 2021-05-28

URL: CVE-2021-33587

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33587

Release Date: 2021-05-28

Fix Resolution (css-what): 5.0.1

Direct dependency fix Resolution (optimize-css-assets-webpack-plugin): 5.0.5

CVE-2018-11698 (Medium) detected in node-sass-4.13.1.tgz - autoclosed

CVE-2018-11698 - Medium Severity Vulnerability

Vulnerable Library - node-sass-4.13.1.tgz

Wrapper around libsass

Library home page: https://registry.npmjs.org/node-sass/-/node-sass-4.13.1.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • ❌ node-sass-4.13.1.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

An issue was discovered in LibSass through 3.5.4. An out-of-bounds read of a memory region was found in the function Sass::handle_error which could be leveraged by an attacker to disclose information or manipulated to read from unmapped memory causing a denial of service.

Publish Date: 2018-06-04

URL: CVE-2018-11698

CVSS 3 Score Details (5.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2018-06-04

Fix Resolution: node-sass - 3.6.0


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2021-32803 (High) detected in tar-2.2.2.tgz, tar-4.4.8.tgz - autoclosed

CVE-2021-32803 - High Severity Vulnerability

Vulnerable Libraries - tar-2.2.2.tgz, tar-4.4.8.tgz

tar-2.2.2.tgz

tar for node

Library home page: https://registry.npmjs.org/tar/-/tar-2.2.2.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • node-sass-4.13.1.tgz (Root Library)
    • node-gyp-3.8.0.tgz
      • ❌ tar-2.2.2.tgz (Vulnerable Library)
tar-4.4.8.tgz

tar for node

Library home page: https://registry.npmjs.org/tar/-/tar-4.4.8.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • webpack-dev-server-3.11.0.tgz (Root Library)
    • chokidar-2.1.8.tgz
      • fsevents-1.2.9.tgz
        • node-pre-gyp-0.12.0.tgz
          • ❌ tar-4.4.8.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

The npm package "tar" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the node-tar directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where node-tar checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.

Publish Date: 2021-08-03

URL: CVE-2021-32803

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-r628-mhmh-qjhw

Release Date: 2021-08-03

Fix Resolution (tar): 3.2.3

Direct dependency fix Resolution (node-sass): 5.0.0

Fix Resolution (tar): 3.2.3

Direct dependency fix Resolution (webpack-dev-server): 3.11.1


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2015-9251 (Medium) detected in jquery-1.12.4.js, jquery-1.10.2.min.js - autoclosed

CVE-2015-9251 - Medium Severity Vulnerability

Vulnerable Libraries - jquery-1.12.4.js, jquery-1.10.2.min.js

jquery-1.12.4.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.12.4/jquery.js

Path to dependency file: /nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-web/nifi-web-ui/src/main/frontend/node_modules/jquery-ui/demos/effect/removeClass.html

Path to vulnerable library: /main/frontend/node_modules/jquery-ui/demos/effect/../../external/jquery/jquery.js,/main/frontend/node_modules/jquery-ui-dist/external/jquery/jquery.js,/main/frontend/node_modules/jquery-ui/demos/slider/../../external/jquery/jquery.js

Dependency Hierarchy:

  • ❌ jquery-1.12.4.js (Vulnerable Library)
jquery-1.10.2.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js

Path to dependency file: /nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-web/nifi-web-ui/src/main/frontend/node_modules/jquery-minicolors/without-bootstrap.html

Path to vulnerable library: /main/frontend/node_modules/jquery-minicolors/without-bootstrap.html

Dependency Hierarchy:

  • ❌ jquery-1.10.2.min.js (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.

Publish Date: 2018-01-18

URL: CVE-2015-9251

CVSS 3 Score Details (5.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2015-9251

Release Date: 2018-01-18

Fix Resolution: jQuery - 3.0.0

CVE-2018-19827 (High) detected in node-sass-4.13.1.tgz - autoclosed

CVE-2018-19827 - High Severity Vulnerability

Vulnerable Library - node-sass-4.13.1.tgz

Wrapper around libsass

Library home page: https://registry.npmjs.org/node-sass/-/node-sass-4.13.1.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • ❌ node-sass-4.13.1.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

In LibSass 3.5.5, a use-after-free vulnerability exists in the SharedPtr class in SharedPtr.cpp (or SharedPtr.hpp) that may cause a denial of service (application crash) or possibly have unspecified other impact.

Publish Date: 2018-12-03

URL: CVE-2018-19827

CVSS 3 Score Details (8.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2018-12-03

Fix Resolution: GR.PageRender.Razor - 1.8.0;Fable.Template.Elmish.React - 0.1.6


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2018-11499 (Critical) detected in node-sass-4.13.1.tgz - autoclosed

CVE-2018-11499 - Critical Severity Vulnerability

Vulnerable Library - node-sass-4.13.1.tgz

Wrapper around libsass

Library home page: https://registry.npmjs.org/node-sass/-/node-sass-4.13.1.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • ❌ node-sass-4.13.1.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

A use-after-free vulnerability exists in handle_error() in sass_context.cpp in LibSass 3.4.x and 3.5.x through 3.5.4 that could be leveraged to cause a denial of service (application crash) or possibly unspecified other impact.

Publish Date: 2018-05-26

URL: CVE-2018-11499

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2018-05-26

Fix Resolution: 4.14.0


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2021-23337 (High) detected in lodash-4.17.18.tgz - autoclosed

CVE-2021-23337 - High Severity Vulnerability

Vulnerable Library - lodash-4.17.18.tgz

Lodash modular utilities.

Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.18.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • core-7.4.4.tgz (Root Library)
    • ❌ lodash-4.17.18.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.

Publish Date: 2021-02-15

URL: CVE-2021-23337

CVSS 3 Score Details (7.2)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: High
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-35jh-r3h4-6jhm

Release Date: 2021-02-15

Fix Resolution (lodash): 4.17.21

Direct dependency fix Resolution (@babel/core): 7.4.5


⛑️ Automatic Remediation will be attempted for this issue.

CVE-2020-11022 (Medium) detected in multiple libraries - autoclosed

CVE-2020-11022 - Medium Severity Vulnerability

Vulnerable Libraries - jquery-1.10.2.min.js, jquery-1.12.4.js, jquery-3.1.1.min.js

jquery-1.10.2.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js

Path to dependency file: /nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-web/nifi-web-ui/src/main/frontend/node_modules/jquery-minicolors/without-bootstrap.html

Path to vulnerable library: /main/frontend/node_modules/jquery-minicolors/without-bootstrap.html

Dependency Hierarchy:

  • ❌ jquery-1.10.2.min.js (Vulnerable Library)
jquery-1.12.4.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.12.4/jquery.js

Path to dependency file: /nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-web/nifi-web-ui/src/main/frontend/node_modules/jquery-ui/demos/effect/removeClass.html

Path to vulnerable library: /main/frontend/node_modules/jquery-ui/demos/effect/../../external/jquery/jquery.js,/main/frontend/node_modules/jquery-ui-dist/external/jquery/jquery.js,/main/frontend/node_modules/jquery-ui/demos/slider/../../external/jquery/jquery.js

Dependency Hierarchy:

  • ❌ jquery-1.12.4.js (Vulnerable Library)
jquery-3.1.1.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/3.1.1/jquery.min.js

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-docs/src/main/webapp/js/jquery.min.js

Dependency Hierarchy:

  • ❌ jquery-3.1.1.min.js (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

Publish Date: 2020-04-29

URL: CVE-2020-11022

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022

Release Date: 2020-04-29

Fix Resolution: jQuery - 3.5.0

CVE-2019-18797 (Medium) detected in node-sass-4.13.1.tgz - autoclosed

CVE-2019-18797 - Medium Severity Vulnerability

Vulnerable Library - node-sass-4.13.1.tgz

Wrapper around libsass

Library home page: https://registry.npmjs.org/node-sass/-/node-sass-4.13.1.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy:

  • ❌ node-sass-4.13.1.tgz (Vulnerable Library)

Found in HEAD commit: d9bab7423d2f0a27e478e0a225fccf352baa0cf2

Found in base branch: main

Vulnerability Details

LibSass 3.6.1 has uncontrolled recursion in Sass::Eval::operator()(Sass::Binary_Expression*) in eval.cpp.

Publish Date: 2019-11-06

URL: CVE-2019-18797

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2019-18797

Release Date: 2019-11-06

Fix Resolution: 4.14.0


⛑️ Automatic Remediation will be attempted for this issue.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    πŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. πŸ“ŠπŸ“ˆπŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❀️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.