CVE-2020-9482
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
If NiFi Registry 0.1.0 to 0.5.0 uses an authentication mechanism other than PKI, when the user clicks Log Out, NiFi Registry invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to NiFi Registry.
Si NiFi Registry versiones 0.1.0 hasta 0.5.0 usa un mecanismo de autenticación distinto de PKI, cuando el usuario hace clic en Log Out, NiFi Registry invalida el token de autenticación en el lado del cliente pero no en el lado del servidor. Esto permite que el token del lado del cliente del usuario sea usado hasta 12 horas después de cerrar sesión para llevar a cabo peticiones de la API al NiFi Registry.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-03-01 CVE Reserved
- 2020-04-28 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-613: Insufficient Session Expiration
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://nifi.apache.org/registry-security.html#CVE-2020-9482 | 2020-05-05 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Nifi Registry Search vendor "Apache" for product "Nifi Registry" | >= 0.1.0 <= 0.5.0 Search vendor "Apache" for product "Nifi Registry" and version " >= 0.1.0 <= 0.5.0" | - |
Affected
|