A malicious host header in an incoming HTTP request could cause NiFi to load resources from an external server. The fix to sanitize host headers and compare to a controlled whitelist was applied on the Apache NiFi 1.5.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://nifi.apache.org/security.html#CVE-2017-12632 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-16T20:01:20.753Z
Reserved: 2017-08-07T00:00:00
Link: CVE-2017-12632

No data.

Status : Modified
Published: 2018-01-23T22:29:00.277
Modified: 2024-11-21T03:09:56.150
Link: CVE-2017-12632

No data.