Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2023-40037 PoC — Apache NiFi: Incomplete Validation of JDBC and JNDI Connection URLs

Source
Associated Vulnerability
Title:Apache NiFi: Incomplete Validation of JDBC and JNDI Connection URLs (CVE-2023-40037)
Description:Apache NiFi 1.21.0 through 1.23.0 support JDBC and JNDI JMS access in several Processors and Controller Services with connection URL validation that does not provide sufficient protection against crafted inputs. An authenticated and authorized user can bypass connection URL validation using custom input formatting. The resolution enhances connection URL validation and introduces validation for additional related properties. Upgrading to Apache NiFi 1.23.1 is the recommended mitigation.
Description
CVE-2023-40037: Incomplete Validation of JDBC and JNDI Connection URLs in Apache NiFi
Readme
# CVE-2023-40037: Incomplete Validation of JDBC and JNDI Connection URLs in Apache NiFi

Apache NiFi 1.21.0 through 1.23.0 support JDBC and JNDI JMS access in several Processors and Controller Services with connection URL validation that does not provide sufficient protection against crafted inputs. An authenticated and authorized user can bypass connection URL validation using custom input formatting. The resolution enhances connection URL validation and introduces validation for additional related properties. Upgrading to Apache NiFi 1.23.1 is the recommended mitigation.

### Vendor Disclosure:

The vendor's disclosure and fix for this vulnerability can be found [here](https://nifi.apache.org/security.html#CVE-2023-40037).

### Requirements:

This vulnerability requires:
<br/>
- Valid user credentials

### Proof Of Concept:

More details and the exploitation process can be found in this [PDF](https://github.com/mbadanoiu/CVE-2023-40037/blob/main/Apache%20NiFi%20-%20CVE-2023-40037.pdf).
File Snapshot

[4.0K] /data/pocs/000a9dc7848e4cc560b4fb236f1ba400ffc294f8 ├── [1.5M] Apache NiFi - CVE-2023-40037.pdf └── [1003] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →