CVE-2024-37389 — Apache NiFi Improper Neutralization of Input in Parameter Context Description

Apache NiFi 1.10.0 through 1.26.0 and 2.0.0-M1 through 2.0.0-M3 support a description field in the Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session context of the authenticated user. Upgrading to Apache NiFi 1.27.0 or 2.0.0-M4 is the recommended mitigation.

This issue is being tracked as NIFI-13374

Proof of Concepts

Apache NiFi allows users to add comments to a Parameter Context. However, the input for this comments was not properly sanitized, leading to a Cross-Site Scripting (XSS) vulnerability. This could allow malicious users to inject and execute arbitrary scripts, posing significant security risks.

  1. Create a new Parameter Context with XSS payload in the comment section.
  2. Create a new Process Group. While the popup shows, hover the cursor to the “?” icon to trigger XSS.

XSS Payload will triggered once you hover in the ? icon for description in tooltip.

Impact

An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session context of the authenticated user.