A recently identified vulnerability in Apache NiFi could result in the unintended exposure of sensitive parameter values in debug logs, potentially leading to the leakage of confidential information. Designated as CVE-2024-52067, the issue impacts NiFi versions 1.16.0 to 1.28.0, as well as versions 2.0.0-M1 through 2.0.0-M4. Apache NiFi is a robust dataflow management platform that facilitates the movement, transformation, and integration of data across various systems using flow-based programming. Its user-friendly web interface allows users to design, monitor, and manage dataflows efficiently, making it a highly adaptable tool for data processing and integration tasks. The vulnerability stems from NiFi's optional debug logging feature, which can be enabled during flow synchronization. Although this logging feature is disabled by default, administrators with access to logging settings could inadvertently expose sensitive details such as parameter names and values in debug logs. The official security advisory notes that "Parameter Context values may contain sensitive data depending on the application flow configuration," meaning the extent of exposure depends on how NiFi is set up for specific workflows. Systems using NiFi’s default Logback configuration are not impacted by this vulnerability. However, organizations that have modified their logging configurations should promptly review and address their settings to prevent sensitive data from being exposed inadvertently.
IBM released security patches for over 100 vulnerabilities across various products. The biggest sufferers of these patches were Storage Defender, for which patches were issued for ...
Fieldtex Products, a U.S.-based provider of contract sewing and medical supply fulfillment, has reported a data breach following an attack attributed to a well-known ransomware ope...
The Pierce County Library System (PCLS) has announced a major data breach affecting more than 340,000 individuals, including library patrons, employees, former employees, and some ...