Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/mbadanoiu/CVE-2023-34212

CVE-2023-34212: Java Deserialization via JNDI Components in Apache NiFi
https://github.com/mbadanoiu/CVE-2023-34212

0-day authenticated cve cve-2023-34212 cves remote-code-execution

Last synced: 23 days ago
JSON representation

CVE-2023-34212: Java Deserialization via JNDI Components in Apache NiFi

Awesome Lists containing this project

README

        

# CVE-2023-34212: Java Deserialization via JNDI Components in Apache NiFi

The JndiJmsConnectionFactoryProvider Controller Service along with the ConsumeJMS and PublishJMS Processors, in Apache NiFi 1.8.0 through 1.21.0 allow an authenticated and authorized user to configure URL and library properties that enable deserialization of untrusted data from a remote location.

### Vendor Disclosure:

The vendor's disclosure and fix for this vulnerability can be found [here](https://nifi.apache.org/security.html#CVE-2023-34212).

### Requirements:

This vulnerability requires:


- Valid user credentials

### Proof Of Concept:

More details and the exploitation process can be found in this [PDF](https://github.com/mbadanoiu/CVE-2023-34212/blob/main/Apache%20NiFi%20-%20CVE-2023-34212.pdf).

### Additional Resources:

Kudos to [Veraxy00 of Qianxin TI Center](https://github.com/Veraxy00) for discovering and reporting the vulnerability in the same time period as me.

[CVE-2023-40037: Incomplete Validation of JDBC and JNDI Connection URLs in Apache NiFi](https://github.com/mbadanoiu/CVE-2023-40037) can be used to bypass security measures implemented for CVE-2023-34212 resulting in RCE for versions of Apache NiFi <= 1.23.0.