Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.nifi/nifi
  4. ›
  5. CVE-2022-26850

CVE-2022-26850: Insufficiently Protected Credentials

April 6, 2022 (updated August 8, 2023)

When creating or updating credentials for single-user access, Apache NiFi wrote a copy of the Login Identity Providers configuration to the operating system temporary directory. On most platforms, the operating system temporary directory has global read permissions. NiFi immediately moved the temporary file to the final configuration directory, which significantly limited the window of opportunity for access. NiFi 1.16.0 includes updates to replace the Login Identity Providers configuration without writing a file to the operating system temporary directory.

References

  • www.openwall.com/lists/oss-security/2022/04/06/2
  • nifi.apache.org/security.html
  • nvd.nist.gov/vuln/detail/CVE-2022-26850

Code Behaviors & Features

Detect and mitigate CVE-2022-26850 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 1.14.0 before 1.16.0

Fixed versions

  • 1.16.0

Solution

Upgrade to version 1.16.0 or above.

Impact 4.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-668: Exposure of Resource to Wrong Sphere

Source file

maven/org.apache.nifi/nifi/CVE-2022-26850.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:59 +0000.