-
CVSS Score
-A Semantic Attack on Google Gemini - Read the Latest Research
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.nifi:nifi | maven | >= 1.0.0, < 1.5.0 | 1.5.0 |
The vulnerability stems from improper handling of X-ProxyContextPath/X-Forwarded-Context headers. The core functions would be: 1) WebUtils.getProxiedContextPath which directly processes these headers, 2) StandardNiFiService methods that consume these values for context path resolution, and 3) JSP rendering layers that output the context path without encoding. The patch evidence from NIFI-4501/PR#2279 indicates these were the focus of header validation improvements. The JSP layer is implicated due to historical XSS patterns in header rendering.