Miggo Logo

CVE-2025-27017:
Apache NiFi: Potential Insertion of MongoDB Password in Provenance Record

6.9

CVSS Score
4.0

Basic Information

EPSS Score
0.2243%
Published
3/12/2025
Updated
3/12/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:Y/R:U/V:C/RE:L/U:Green
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.nifi:nifi-mongodb-servicesmaven>= 1.13.0, < 2.3.02.3.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from credentials being included in provenance events. The commit diff shows the removal of the getURI method, which previously manually injected credentials into the MongoDB connection URI using URL encoding. This URI was likely logged in provenance events. The patched version avoids embedding credentials in the URI by using MongoCredential separately, and the test update verifies the transit URI no longer contains credentials. The getURI() function's role in constructing the credential-containing URI directly matches the vulnerability's root cause.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*p**** Ni*i *.**.* t*rou** *.*.* in*lu**s t** us*rn*m* *n* p*sswor* us** to *ut**nti**t* wit* Mon*o** in t** Ni*i prov*n*n** *v*nts t**t Mon*o** *ompon*nts **n*r*t* *urin* pro**ssin*. *n *ut*oriz** us*r wit* r*** ****ss to t** prov*n*n** *v*nts o* t*

Reasoning

T** vuln*r**ility st*ms *rom *r***nti*ls **in* in*lu*** in prov*n*n** *v*nts. T** *ommit *i** s*ows t** r*mov*l o* t** `**tURI` m*t*o*, w*i** pr*viously m*nu*lly inj**t** *r***nti*ls into t** `Mon*o**` *onn**tion URI usin* URL *n*o*in*. T*is URI w*s