CVE-2024-52067

4.9 MEDIUM

📋 TL;DR

Apache NiFi versions 1.16.0-1.28.0 and 2.0.0-M1-2.0.0-M4 have debug logging that can expose sensitive parameter values when enabled. Authorized administrators can enable debug logging during flow synchronization, causing parameter names and values to be written to application logs. This affects deployments where administrators have logging configuration access and parameter contexts contain sensitive data.

💻 Affected Systems

Products:
  • Apache NiFi
Versions: 1.16.0 through 1.28.0 and 2.0.0-M1 through 2.0.0-M4
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when debug logging is enabled for framework flow synchronization. Default Logback configuration does not log parameter values.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive credentials, API keys, or other secrets stored in Parameter Contexts are exposed in application logs, potentially leading to credential theft and system compromise.

🟠

Likely Case

Authorized administrators accidentally or intentionally enable debug logging, exposing parameter values to anyone with log access, potentially violating data protection requirements.

🟢

If Mitigated

With default Logback configuration, no parameter values are logged, limiting exposure to systems where debug logging has been manually enabled.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authorized administrator access to change logging levels. No special tools or techniques needed beyond enabling debug logging.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apache NiFi 2.0.0 or 1.28.1

Vendor Advisory: https://lists.apache.org/thread/9rz5rwn2zc7pfjq7ppqldqlc067tlcwd

Restart Required: Yes

Instructions:

1. Download Apache NiFi 2.0.0 or 1.28.1 from official Apache website. 2. Backup current configuration and data. 3. Stop NiFi service. 4. Replace installation with patched version. 5. Restore configuration and data. 6. Start NiFi service.

🔧 Temporary Workarounds

Disable debug logging for flow synchronization

all

Ensure debug logging is not enabled for org.apache.nifi.controller.flow.FlowSynchronization class

Check logback.xml configuration for <logger name="org.apache.nifi.controller.flow.FlowSynchronization" level="INFO"/>

Restrict logging configuration access

all

Limit which administrators can modify logging levels

🧯 If You Can't Patch

  • Audit and restrict administrator access to logging configuration
  • Regularly review application logs for parameter value exposure

🔍 How to Verify

Check if Vulnerable:

Check NiFi version and verify if debug logging is enabled for org.apache.nifi.controller.flow.FlowSynchronization in logback.xml

Check Version:

Check nifi-app.log for version information or run: java -jar nifi-app.jar --version

Verify Fix Applied:

Verify NiFi version is 2.0.0 or 1.28.1, or test that enabling debug logging for FlowSynchronization no longer logs parameter values

📡 Detection & Monitoring

Log Indicators:

  • Parameter values appearing in logs with DEBUG level entries from FlowSynchronization class

SIEM Query:

source="nifi-app.log" AND "DEBUG" AND "FlowSynchronization" AND "Parameter"

🔗 References

📤 Share & Export