You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@nifi.apache.org by "Phil Lee (Jira)" <ji...@apache.org> on 2023/03/24 04:40:00 UTC
[jira] [Created] (NIFI-11339) Update org.springframework_spring-core to 5.3.26 or 6.0.7
Phil Lee created NIFI-11339:
-------------------------------
Summary: Update org.springframework_spring-core to 5.3.26 or 6.0.7
Key: NIFI-11339
URL: https://issues.apache.org/jira/browse/NIFI-11339
Project: Apache NiFi
Issue Type: Improvement
Affects Versions: 1.20.0
Reporter: Phil Lee
Update org.springframework_spring-core from 5.3.24 to 5.3.26 or 6.0.7. This will remediate [https://nvd.nist.gov/vuln/detail/CVE-2023-20861]
Twistlock scan reported this as high severity vulnerability in NiFi Registry version 1.20.0.
|Impacted versions: >=5.3.0 and <5.3.26
Discovered: less than an hour ago
Published: 7 hours ago|
In Spring Framework versions 6.0.0 - 6.0.6, 5.3.0 - 5.3.25, 5.2.0.RELEASE - 5.2.22.RELEASE, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)