In Apache NiFi 1.2.0 to 1.11.4, the NiFi UI and API were protected by mandating TLS v1.2, as well as listening connections established by processors like ListenHTTP, HandleHttpRequest, etc. However intracluster communication such as cluster request replication, Site-to-Site, and load balanced queues continued to support TLS v1.0 or v1.1.
References
Configurations
History
21 Nov 2024, 05:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.apache.org/thread.html/r2d9c21f9ec35d66f2bb42f8abe876dabd786166b6284e9a33582c718%40%3Ccommits.nifi.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/re48582efe2ac973f8cff55c8b346825cb491c71935e15ab2d61ef3bf%40%3Ccommits.nifi.apache.org%3E - | |
References | () https://nifi.apache.org/security#CVE-2020-9491 - Vendor Advisory |
28 Apr 2022, 18:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-327 | |
References | (MLIST) https://lists.apache.org/thread.html/re48582efe2ac973f8cff55c8b346825cb491c71935e15ab2d61ef3bf@%3Ccommits.nifi.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r2d9c21f9ec35d66f2bb42f8abe876dabd786166b6284e9a33582c718@%3Ccommits.nifi.apache.org%3E - Mailing List, Patch, Vendor Advisory |
Information
Published : 2020-10-01 20:15
Updated : 2024-11-21 05:40
NVD link : CVE-2020-9491
Mitre link : CVE-2020-9491
CVE.ORG link : CVE-2020-9491
JSON object : View
Products Affected
apache
- nifi
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm