CVE-2017-5635: Improper Authentication In Apache NiFi
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.77364%
CWE
Published
5/13/2022
Updated
1/30/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.nifi:nifi | maven | < 0.7.2 | 0.7.2 |
| org.apache.nifi:nifi | maven | >= 1.0.0, < 1.1.2 | 1.1.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper proxy chain handling during cluster request replication. Key functions identified are:
- ProxiedEntitiesUtils.getProxiedEntities - Directly responsible for parsing and constructing user identity chains. The security advisory specifically mentions proxy chain validation changes here.
- ApplicationResource.createClusterRequest - The entry point for cluster request handling where user identity propagation occurs. The medium confidence comes from indirect evidence in advisory descriptions about request replication behavior. The functions were selected based on the patch description mentioning proxy chain iteration changes and cluster request handling improvements. The first function's role in identity resolution makes it the primary vulnerable component.