Insufficiently Protected Credentials via Insecure Temporary File in org.apache.nifi:nifi-single-user-utils
Moderate severity
GitHub Reviewed
Published
Apr 6, 2022
in
JLLeitschuh/security-research
•
Updated Aug 17, 2023
Package
Affected versions
<= 1.15.3
Patched versions
1.16
Description
Published by the National Vulnerability Database
Apr 6, 2022
Published to the GitHub Advisory Database
Jun 20, 2022
Reviewed
Jun 20, 2022
Last updated
Aug 17, 2023
Impact
org.apache.nifi.authentication.single.user.writer.StandardLoginCredentialsWriter
contains a local information disclosure vulnerability due to writing credentials (username and password) to a file that is readable by all other users on unix-like systems. On unix-like systems, the system's temporary directory is shared between all users on that system. As such, files written to that directory without setting the correct file permissions can allow other users on that system to view the contents of the files written to those temporary files.Source
An insecure temporary file is created here:
The username and password credentials are written to this file here:
Patches
The vulnerability has been patched in version
1.16
.Prerequisites
This vulnerability impacts Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users.
Workarounds
Setting the
java.io.tmpdir
system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability for all operating systems.References
References