VYPR
Moderate severityNVD Advisory· Published Oct 29, 2024· Updated Oct 29, 2024

Apache NiFi: Improper Neutralization of Input in Parameter Description

CVE-2024-45477

Description

Apache NiFi 1.10.0 through 1.27.0 and 2.0.0-M1 through 2.0.0-M3 support a description field for Parameters in a Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session context of the authenticated user. Upgrading to Apache NiFi 1.28.0 or 2.0.0-M4 is the recommended mitigation.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2024-45477 is a stored cross-site scripting vulnerability in Apache NiFi's Parameter Context description field, affecting versions 1.10.0 through 1.27.0 and 2.0.0-M1 through M3.

Apache NiFi versions 1.10.0 through 1.27.0 and 2.0.0-M1 through 2.0.0-M3 contain a stored cross-site scripting (XSS) vulnerability in the Parameter Context configuration. The description field for parameters does not properly sanitize user input, allowing an authenticated user with authorization to configure a Parameter Context to inject arbitrary JavaScript code [1][3].

Exploitation requires an authenticated user who has been granted permission to modify a Parameter Context. No additional privileges are needed. The injected script is stored and later executed in the browser of any authenticated user who views the affected Parameter Context description, within the security context of that user's session [1].

An attacker can execute arbitrary JavaScript in the victim's browser session, potentially stealing session cookies, exfiltrating sensitive data, or performing actions on behalf of the victim. This compromises the confidentiality and integrity of the application within the affected user's permissions [1].

Mitigation involves upgrading to Apache NiFi 1.28.0 or 2.0.0-M4, which include the fix implemented in pull request #9195 [1][2]. The NVD has not yet assigned a CVSS score, but the vulnerability is rated as moderate to high depending on the environment [3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.nifi:nifi-web-uiMaven
>= 1.10.0, < 1.28.01.28.0
org.apache.nifi:nifi-web-uiMaven
>= 2.0.0-M1, < 2.0.0-M42.0.0-M4

Affected products

3

Patches

1
153c87a7daae

NIFI-13675 Fixed Tooltip for Parameter Description (#9195)

https://github.com/apache/nifiPierre VillardAug 25, 2024via ghsa
1 file changed · +1 1
  • nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-web/nifi-web-ui/src/main/webapp/js/nf/canvas/nf-parameter-contexts.js+1 1 modified
    @@ -2194,7 +2194,7 @@
                         infoIcon.qtip($.extend({},
                             nfCommon.config.tooltipConfig,
                             {
    -                            content: parameter.description
    +                            content: nfCommon.escapeHtml(parameter.description)
                             }));
                     }
                 }
    

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.