A recently identified vulnerability in Apache NiFi could result in the unintended exposure of sensitive parameter values in debug logs, potentially leading to the leakage of confidential information. Designated as CVE-2024-52067, the issue impacts NiFi versions 1.16.0 to 1.28.0, as well as versions 2.0.0-M1 through 2.0.0-M4. Apache NiFi is a robust dataflow management platform that facilitates the movement, transformation, and integration of data across various systems using flow-based programming. Its user-friendly web interface allows users to design, monitor, and manage dataflows efficiently, making it a highly adaptable tool for data processing and integration tasks. The vulnerability stems from NiFi's optional debug logging feature, which can be enabled during flow synchronization. Although this logging feature is disabled by default, administrators with access to logging settings could inadvertently expose sensitive details such as parameter names and values in debug logs. The official security advisory notes that "Parameter Context values may contain sensitive data depending on the application flow configuration," meaning the extent of exposure depends on how NiFi is set up for specific workflows. Systems using NiFi’s default Logback configuration are not impacted by this vulnerability. However, organizations that have modified their logging configurations should promptly review and address their settings to prevent sensitive data from being exposed inadvertently.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...