In Apache NiFi 1.2.0 to 1.11.4, the NiFi UI and API were protected by mandating TLS v1.2, as well as listening connections established by processors like ListenHTTP, HandleHttpRequest, etc. However intracluster communication such as cluster request replication, Site-to-Site, and load balanced queues continued to support TLS v1.0 or v1.1.
References
Link | Resource |
---|---|
https://nifi.apache.org/security#CVE-2020-9491 | Vendor Advisory |
https://lists.apache.org/thread.html/re48582efe2ac973f8cff55c8b346825cb491c71935e15ab2d61ef3bf@%3Ccommits.nifi.apache.org%3E | Mailing List Vendor Advisory |
https://lists.apache.org/thread.html/r2d9c21f9ec35d66f2bb42f8abe876dabd786166b6284e9a33582c718@%3Ccommits.nifi.apache.org%3E | Mailing List Patch Vendor Advisory |
Configurations
Information
Published : 2020-10-01 13:15
Updated : 2022-04-28 11:22
NVD link : CVE-2020-9491
Mitre link : CVE-2020-9491
JSON object : View
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
Products Affected
apache
- nifi