CVE-2020-9482Insufficient Session Expiration in Apache Nifi Registry

Severity
6.5MEDIUMNVD
EPSS
0.9%
top 23.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 28
Latest updateFeb 9

Description

If NiFi Registry 0.1.0 to 0.5.0 uses an authentication mechanism other than PKI, when the user clicks Log Out, NiFi Registry invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to NiFi Registry.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:NExploitability: 3.9 | Impact: 2.5

Affected Packages2 packages

NVDapache/nifi_registry0.1.00.5.0
CVEListV5apache/apache_nifi_registry0.1.0 to 0.5.0

Patches

🔴Vulnerability Details

3
GHSA
Insufficient Session Expiration in Apache NiFi Registry2022-02-09
OSV
Insufficient Session Expiration in Apache NiFi Registry2022-02-09
CVEList
CVE-2020-9482: If NiFi Registry 02020-04-28

📋Vendor Advisories

1
Apache
Apache nifi: CVE-2020-9482
CVE-2020-9482 — Insufficient Session Expiration | cvebase