CVE-2018-1310:
Apache NiFi JMS Deserialization issue
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.8103%
CWE
Published
5/14/2022
Updated
1/30/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.nifi:nifi | maven | < 1.6.0 | 1.6.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from Apache NiFi's use of a pre-5.15.3 ActiveMQ client (CVE-2015-5254), which allows unsafe deserialization via JMS ObjectMessage. The NiFi JMS processors (ConsumeJMS
/PublishJMS
) are the entry points for processing messages. The ConsumeJMS.onTrigger
method drives message consumption, invoking ActiveMQ's deserialization routines. The JMSConsumer.consume
method directly interacts with the JMS client to retrieve messages. During exploitation, these functions would appear in runtime profiles when processing malicious JMS content. The patch upgraded the library, implying these functions were the execution path for the vulnerability.