Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-34468", "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "state": "PUBLISHED", "assignerShortName": "apache", "dateReserved": "2023-06-06T17:30:23.654Z", "datePublished": "2023-06-12T15:09:20.711Z", "dateUpdated": "2025-02-13T16:55:36.706Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "Apache NiFi", "vendor": "Apache Software Foundation", "versions": [{"lessThanOrEqual": "1.21.0", "status": "affected", "version": "0.0.2", "versionType": "semver"}]}], "credits": [{"lang": "en", "type": "finder", "value": "Matei \"Mal\" Badanoiu"}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<div>The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution.</div><div>The resolution validates the Database URL and rejects H2 JDBC locations.</div><div>You are recommended to upgrade to version 1.22.0 or later which fixes this issue.<br></div>"}], "value": "The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution.\n\nThe resolution validates the Database URL and rejects H2 JDBC locations.\n\nYou are recommended to upgrade to version 1.22.0 or later which fixes this issue."}], "metrics": [{"other": {"content": {"text": "important"}, "type": "Textual description of severity"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code ('Code Injection')", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache", "dateUpdated": "2023-09-28T21:01:53.253Z"}, "references": [{"tags": ["release-notes"], "url": "https://nifi.apache.org/security.html#CVE-2023-34468"}, {"tags": ["vendor-advisory"], "url": "https://lists.apache.org/thread/7b82l4f5blmpkfcynf3y6z4x1vqo59h8"}, {"url": "http://www.openwall.com/lists/oss-security/2023/06/12/3"}, {"url": "http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html"}, {"url": "https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation/"}], "source": {"defect": ["NIFI-11653"], "discovery": "EXTERNAL"}, "timeline": [{"lang": "en", "time": "2023-06-06T01:00:00.000Z", "value": "reported"}, {"lang": "en", "time": "2023-06-06T09:00:00.000Z", "value": "confirmed"}, {"lang": "en", "time": "2023-06-06T09:00:00.000Z", "value": "resolved"}], "title": "Apache NiFi: Potential Code Injection with Database Services using H2", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T16:10:07.133Z"}, "title": "CVE Program Container", "references": [{"tags": ["release-notes", "x_transferred"], "url": "https://nifi.apache.org/security.html#CVE-2023-34468"}, {"tags": ["vendor-advisory", "x_transferred"], "url": "https://lists.apache.org/thread/7b82l4f5blmpkfcynf3y6z4x1vqo59h8"}, {"url": "http://www.openwall.com/lists/oss-security/2023/06/12/3", "tags": ["x_transferred"]}, {"url": "http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html", "tags": ["x_transferred"]}, {"url": "https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation/", "tags": ["x_transferred"]}]}, {"affected": [{"vendor": "apache", "product": "nifi", "cpes": ["cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0.0.2", "status": "affected", "lessThanOrEqual": "1.21.0", "versionType": "custom"}]}], "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "ssvc", "content": {"timestamp": "2024-10-08T20:21:50.926008Z", "id": "CVE-2023-34468", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-10-08T20:27:24.966Z"}}]}}