Learn about CVE-2019-12421 affecting Apache NiFi versions 1.0.0 to 1.9.2. Understand the impact, technical details, and mitigation steps for this authentication token invalidation vulnerability.
Apache NiFi versions 1.0.0 to 1.9.2 have a vulnerability where the authentication token is not invalidated on the server side when a user logs out, allowing the client-side token to remain valid for up to 12 hours.
Understanding CVE-2019-12421
This CVE affects Apache NiFi versions 1.0.0 to 1.9.2.
What is CVE-2019-12421?
In Apache NiFi versions 1.0.0 to 1.9.2, the authentication token is not properly invalidated on the server side when a user logs out, leading to a client-side token remaining valid for up to 12 hours.
The Impact of CVE-2019-12421
This vulnerability allows users to continue making API requests to NiFi using the client-side token even after logging out, potentially leading to unauthorized access and security breaches.
Technical Details of CVE-2019-12421
Apache NiFi versions 1.0.0 to 1.9.2 are affected by this authentication issue.
Vulnerability Description
When a user logs out of NiFi, the authentication token is invalidated only on the client side, leaving the server-side token valid for up to 12 hours.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability arises when using an authentication mechanism other than PKI, allowing the client-side token to remain active post-logout.
Mitigation and Prevention
It is crucial to take immediate steps to address and prevent exploitation of this vulnerability.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates