File tree Expand file tree Collapse file tree 1 file changed +23
-0
lines changed
Expand file tree Collapse file tree 1 file changed +23
-0
lines changed Original file line number Diff line number Diff line change @@ -65,6 +65,29 @@ Severity ratings represent the determination of project members based on an eval
6565# Published Vulnerabilities
6666
6767The following announcements include published vulnerabilities that apply directly to Apache NiFi components.
68+
69+ {{< vulnerability
70+ id="CVE-2025 -66524"
71+ title="Deserialization of Untrusted Data in GetAsanaObject Processor"
72+ published="2025-12-19"
73+ severity="High"
74+ products="Apache NiFi"
75+ affectedVersions="1.20.0 to 2.6.0"
76+ fixedVersion="2.7.0"
77+ jira="NIFI-15292"
78+ pullRequest="10599"
79+ reporter="Jaeyeong Lee" >}}
80+
81+ Apache NiFi 1.20.0 through 2.6.0 include the GetAsanaObject Processor, which requires integration with a configurable
82+ Distribute Map Cache Client Service for storing and retrieving state information. The GetAsanaObject Processor used
83+ generic Java Object serialization and deserialization without filtering. Unfiltered Java object deserialization does not
84+ provide protection against crafted state information stored in the cache server configured for GetAsanaObject.
85+ Exploitation requires an Apache NiFi system running with the GetAsanaObject Processor, and direct access to the
86+ configured cache server. Upgrading to Apache NiFi 2.7.0 is the recommended mitigation, which replaces Java Object
87+ serialization with JSON serialization. Removing the GetAsanaObject Processor located in the nifi-asana-processors-nar
88+ bundle also prevents exploitation.
89+
90+ {{</ vulnerability >}}
6891
6992{{< vulnerability
7093id="CVE-2025 -27017"
You can’t perform that action at this time.
0 commit comments