Apache NiFi 1.13.0 through 2.2.0 includes the username and password used to authenticate with MongoDB in the NiFi provenance events that MongoDB components generate during processing. An authorized user with read access to the provenance events of those processors may see the credentials information. Upgrading to Apache NiFi 2.3.0 is the recommended mitigation, which removes the credentials from provenance event records.
Metrics
Affected Vendors & Products
References
History
Wed, 12 Mar 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 12 Mar 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 12 Mar 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Apache NiFi 1.13.0 through 2.2.0 includes the username and password used to authenticate with MongoDB in the NiFi provenance events that MongoDB components generate during processing. An authorized user with read access to the provenance events of those processors may see the credentials information. Upgrading to Apache NiFi 2.3.0 is the recommended mitigation, which removes the credentials from provenance event records. | |
Title | Apache NiFi: Potential Insertion of MongoDB Password in Provenance Record | |
Weaknesses | CWE-538 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-03-12T17:56:14.825Z
Reserved: 2025-02-17T19:27:20.335Z
Link: CVE-2025-27017

Updated: 2025-03-12T17:03:09.415Z

Status : Received
Published: 2025-03-12T17:15:50.327
Modified: 2025-03-12T17:15:50.327
Link: CVE-2025-27017

No data.