Vulnerability Details CVE-2020-9487
In Apache NiFi 1.0.0 to 1.11.4, the NiFi download token (one-time password) mechanism used a fixed cache size and did not authenticate a request to create a download token, only when attempting to use the token to access the content. An unauthenticated user could repeatedly request download tokens, preventing legitimate users from requesting download tokens.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 69.3%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2020-9487
-
cpe:2.3:a:apache:nifi:1.0.0
-
cpe:2.3:a:apache:nifi:1.0.1
-
cpe:2.3:a:apache:nifi:1.1.0
-
cpe:2.3:a:apache:nifi:1.1.1
-
cpe:2.3:a:apache:nifi:1.1.2
-
cpe:2.3:a:apache:nifi:1.10.0
-
cpe:2.3:a:apache:nifi:1.11.0
-
cpe:2.3:a:apache:nifi:1.11.1
-
cpe:2.3:a:apache:nifi:1.11.2
-
cpe:2.3:a:apache:nifi:1.11.3
-
cpe:2.3:a:apache:nifi:1.11.4
-
cpe:2.3:a:apache:nifi:1.2.0
-
cpe:2.3:a:apache:nifi:1.3.0
-
cpe:2.3:a:apache:nifi:1.4.0
-
cpe:2.3:a:apache:nifi:1.5.0
-
cpe:2.3:a:apache:nifi:1.6.0
-
cpe:2.3:a:apache:nifi:1.7.0
-
cpe:2.3:a:apache:nifi:1.7.1
-
cpe:2.3:a:apache:nifi:1.8.0
-
cpe:2.3:a:apache:nifi:1.9.0
-
cpe:2.3:a:apache:nifi:1.9.1
-
cpe:2.3:a:apache:nifi:1.9.2