Skip to content

Commit 10edff9

Browse files
NIFI-15292 Published CVE-2025-66524
1 parent 6248d6e commit 10edff9

File tree

1 file changed

+23
-0
lines changed

1 file changed

+23
-0
lines changed

content/documentation/security.md

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,29 @@ Severity ratings represent the determination of project members based on an eval
6565
# Published Vulnerabilities
6666

6767
The following announcements include published vulnerabilities that apply directly to Apache NiFi components.
68+
69+
{{< vulnerability
70+
id="CVE-2025-66524"
71+
title="Deserialization of Untrusted Data in GetAsanaObject Processor"
72+
published="2025-12-19"
73+
severity="High"
74+
products="Apache NiFi"
75+
affectedVersions="1.20.0 to 2.6.0"
76+
fixedVersion="2.7.0"
77+
jira="NIFI-15292"
78+
pullRequest="10599"
79+
reporter="Jaeyeong Lee" >}}
80+
81+
Apache NiFi 1.20.0 through 2.6.0 include the GetAsanaObject Processor, which requires integration with a configurable
82+
Distribute Map Cache Client Service for storing and retrieving state information. The GetAsanaObject Processor used
83+
generic Java Object serialization and deserialization without filtering. Unfiltered Java object deserialization does not
84+
provide protection against crafted state information stored in the cache server configured for GetAsanaObject.
85+
Exploitation requires an Apache NiFi system running with the GetAsanaObject Processor, and direct access to the
86+
configured cache server. Upgrading to Apache NiFi 2.7.0 is the recommended mitigation, which replaces Java Object
87+
serialization with JSON serialization. Removing the GetAsanaObject Processor located in the nifi-asana-processors-nar
88+
bundle also prevents exploitation.
89+
90+
{{</ vulnerability >}}
6891

6992
{{< vulnerability
7093
id="CVE-2025-27017"

0 commit comments

Comments
 (0)