Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2020-13940

In Apache NiFi 1.0.0 to 1.11.4, the notification service manager and various policy authorizer and user group provider objects allowed trusted administrators to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE).
Exploit prediction scoring system (EPSS) score
EPSS Score 0.017
EPSS Ranking 81.3%
CVSS Severity
CVSS v3 Score 5.5
CVSS v2 Score 4.3
Products affected by CVE-2020-13940
  • Apache » Nifi » Version: 1.0.0
    cpe:2.3:a:apache:nifi:1.0.0
  • Apache » Nifi » Version: 1.0.1
    cpe:2.3:a:apache:nifi:1.0.1
  • Apache » Nifi » Version: 1.1.0
    cpe:2.3:a:apache:nifi:1.1.0
  • Apache » Nifi » Version: 1.1.1
    cpe:2.3:a:apache:nifi:1.1.1
  • Apache » Nifi » Version: 1.1.2
    cpe:2.3:a:apache:nifi:1.1.2
  • Apache » Nifi » Version: 1.10.0
    cpe:2.3:a:apache:nifi:1.10.0
  • Apache » Nifi » Version: 1.11.0
    cpe:2.3:a:apache:nifi:1.11.0
  • Apache » Nifi » Version: 1.11.1
    cpe:2.3:a:apache:nifi:1.11.1
  • Apache » Nifi » Version: 1.11.2
    cpe:2.3:a:apache:nifi:1.11.2
  • Apache » Nifi » Version: 1.11.3
    cpe:2.3:a:apache:nifi:1.11.3
  • Apache » Nifi » Version: 1.11.4
    cpe:2.3:a:apache:nifi:1.11.4
  • Apache » Nifi » Version: 1.2.0
    cpe:2.3:a:apache:nifi:1.2.0
  • Apache » Nifi » Version: 1.3.0
    cpe:2.3:a:apache:nifi:1.3.0
  • Apache » Nifi » Version: 1.4.0
    cpe:2.3:a:apache:nifi:1.4.0
  • Apache » Nifi » Version: 1.5.0
    cpe:2.3:a:apache:nifi:1.5.0
  • Apache » Nifi » Version: 1.6.0
    cpe:2.3:a:apache:nifi:1.6.0
  • Apache » Nifi » Version: 1.7.0
    cpe:2.3:a:apache:nifi:1.7.0
  • Apache » Nifi » Version: 1.7.1
    cpe:2.3:a:apache:nifi:1.7.1
  • Apache » Nifi » Version: 1.8.0
    cpe:2.3:a:apache:nifi:1.8.0
  • Apache » Nifi » Version: 1.9.0
    cpe:2.3:a:apache:nifi:1.9.0
  • Apache » Nifi » Version: 1.9.1
    cpe:2.3:a:apache:nifi:1.9.1
  • Apache » Nifi » Version: 1.9.2
    cpe:2.3:a:apache:nifi:1.9.2


Contact Us

Shodan ® - All rights reserved