Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*", "matchCriteriaId": "65C9ADE4-A067-4445-9500-6A46B5C41599", "versionEndExcluding": "1.28.1", "versionStartIncluding": "1.16.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone1:*:*:*:*:*:*", "matchCriteriaId": "D147AF4C-74C3-41AE-B5A5-24051AC1458B", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc1:*:*:*:*:*:*", "matchCriteriaId": "8F5DBC6B-2239-4349-A836-EFB8BA720145", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc2:*:*:*:*:*:*", "matchCriteriaId": "B366BC5E-6845-40C3-9A2E-89BF99BC0C84", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc3:*:*:*:*:*:*", "matchCriteriaId": "96565E7C-0CE5-439C-9B81-551DC0B7CB9D", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc4:*:*:*:*:*:*", "matchCriteriaId": "7547CA64-3DEC-4322-96CA-C732E132DC3B", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc5:*:*:*:*:*:*", "matchCriteriaId": "8067F8FC-2183-4302-A7EE-29912E68F1A8", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc6:*:*:*:*:*:*", "matchCriteriaId": "B1C2A606-5B3A-47C7-A94A-9BBA6E4B330F", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone2:*:*:*:*:*:*", "matchCriteriaId": "200043CB-5676-4005-97B8-C95BCFF3EE0B", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone2-rc1:*:*:*:*:*:*", "matchCriteriaId": "73A9B62D-47A5-41B3-8E7C-86DED14A230D", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone2-rc2:*:*:*:*:*:*", "matchCriteriaId": "923C9C51-206A-4C12-A60D-3E9DE7808BCD", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone2-rc3:*:*:*:*:*:*", "matchCriteriaId": "98CF1F86-BE1E-410E-A425-873081B9B353", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone2-rc4:*:*:*:*:*:*", "matchCriteriaId": "34AD9B07-0C66-487A-9D32-A75C99852EE0", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone3:*:*:*:*:*:*", "matchCriteriaId": "1DE8050C-59BA-4789-B211-7AC0D0E696BE", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone3-rc1:*:*:*:*:*:*", "matchCriteriaId": "665BBA63-AF45-4B9F-BA0E-6C900E675270", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone4:*:*:*:*:*:*", "matchCriteriaId": "B8128158-569B-4FA7-A3CF-AC330B4EED92", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone4-rc1:*:*:*:*:*:*", "matchCriteriaId": "2F42066D-7304-4C61-9B55-9A3990CDB840", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Apache NiFi 1.16.0 through 1.28.0 and 2.0.0-M1 through 2.0.0-M4 include optional debug logging of Parameter Context values during the flow synchronization process. An authorized administrator with access to change logging levels could enable debug logging for framework flow synchronization, causing the application to write Parameter names and values to the application log. Parameter Context values may contain sensitive information depending on application flow configuration. Deployments of Apache NiFi with the default Logback configuration do not log Parameter Context values. Upgrading to Apache NiFi 2.0.0 or 1.28.1 is the recommendation mitigation, eliminating Parameter value logging from the flow synchronization process regardless of the Logback configuration."}, {"lang": "es", "value": "Apache NiFi 1.16.0 a 1.28.0 y 2.0.0-M1 a 2.0.0-M4 incluyen el registro de depuraci\u00f3n opcional de los valores de contexto de par\u00e1metros durante el proceso de sincronizaci\u00f3n de flujo. Un administrador autorizado con acceso a los niveles de registro de cambios podr\u00eda habilitar el registro de depuraci\u00f3n para la sincronizaci\u00f3n de flujo del marco, lo que har\u00eda que la aplicaci\u00f3n escriba los nombres y valores de los par\u00e1metros en el registro de la aplicaci\u00f3n. Los valores de contexto de par\u00e1metros pueden contener informaci\u00f3n confidencial seg\u00fan la configuraci\u00f3n del flujo de la aplicaci\u00f3n. Las implementaciones de Apache NiFi con la configuraci\u00f3n predeterminada de Logback no registran los valores de contexto de par\u00e1metros. La actualizaci\u00f3n a Apache NiFi 2.0.0 o 1.28.1 es la mitigaci\u00f3n recomendada, que elimina el registro de valores de par\u00e1metros del proceso de sincronizaci\u00f3n de flujo independientemente de la configuraci\u00f3n de Logback."}], "id": "CVE-2024-52067", "lastModified": "2025-02-11T16:26:42.950", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}], "cvssMetricV40": [{"cvssData": {"attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "automatable": "YES", "availabilityRequirements": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirements": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "privilegesRequired": "HIGH", "providerUrgency": "GREEN", "recovery": "USER", "safety": "NOT_DEFINED", "subsequentSystemAvailability": "NONE", "subsequentSystemConfidentiality": "HIGH", "subsequentSystemIntegrity": "LOW", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:D/RE:L/U:Green", "version": "4.0", "vulnerabilityResponseEffort": "LOW", "vulnerableSystemAvailability": "NONE", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "LOW"}, "source": "security@apache.org", "type": "Secondary"}]}, "published": "2024-11-21T11:15:35.007", "references": [{"source": "security@apache.org", "tags": ["Mailing List"], "url": "https://lists.apache.org/thread/9rz5rwn2zc7pfjq7ppqldqlc067tlcwd"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mailing List"], "url": "http://www.openwall.com/lists/oss-security/2024/11/20/2"}], "sourceIdentifier": "security@apache.org", "vulnStatus": "Analyzed", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-532"}], "source": "security@apache.org", "type": "Primary"}]}