{"api_version":"1","generated_at":"2026-04-22T22:50:55+00:00","cve":"CVE-2023-34468","urls":{"html":"https://cve.report/CVE-2023-34468","api":"https://cve.report/api/cve/CVE-2023-34468.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-34468","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-34468"},"summary":{"title":"CVE-2023-34468","description":"The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution.\n\nThe resolution validates the Database URL and rejects H2 JDBC locations.\n\nYou are recommended to upgrade to version 1.22.0 or later which fixes this issue.","state":"PUBLIC","assigner":"security@apache.org","published_at":"2023-06-12 16:15:00","updated_at":"2023-10-03 15:44:00"},"problem_types":["CWE-94"],"metrics":[],"references":[{"url":"http://www.openwall.com/lists/oss-security/2023/06/12/3","name":"http://www.openwall.com/lists/oss-security/2023/06/12/3","refsource":"MISC","tags":[],"title":"oss-security - CVE-2023-34468: Apache NiFi: Potential Code Injection with\n Database Services using H2","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation/","name":"https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation/","refsource":"MISC","tags":[],"title":"Apache NiFi CVE-2023- 34468 RCE Vulnerability Analysis and Exploitation - CYFIRMA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html","name":"http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html","refsource":"MISC","tags":[],"title":"Apache NiFi H2 Connection String Remote Code Execution ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://nifi.apache.org/security.html#CVE-2023-34468","name":"https://nifi.apache.org/security.html#CVE-2023-34468","refsource":"MISC","tags":[],"title":"Apache NiFi Security Reports","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread/7b82l4f5blmpkfcynf3y6z4x1vqo59h8","name":"https://lists.apache.org/thread/7b82l4f5blmpkfcynf3y6z4x1vqo59h8","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-34468","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34468","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"34468","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"nifi","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-34468","ASSIGNER":"security@apache.org","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution.\n\nThe resolution validates the Database URL and rejects H2 JDBC locations.\n\nYou are recommended to upgrade to version 1.22.0 or later which fixes this issue.\n\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-94 Improper Control of Generation of Code ('Code Injection')","cweId":"CWE-94"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apache Software Foundation","product":{"product_data":[{"product_name":"Apache NiFi","version":{"version_data":[{"version_affected":"<=","version_name":"0.0.2","version_value":"1.21.0"}]}}]}}]}},"references":{"reference_data":[{"url":"https://nifi.apache.org/security.html#CVE-2023-34468","refsource":"MISC","name":"https://nifi.apache.org/security.html#CVE-2023-34468"},{"url":"https://lists.apache.org/thread/7b82l4f5blmpkfcynf3y6z4x1vqo59h8","refsource":"MISC","name":"https://lists.apache.org/thread/7b82l4f5blmpkfcynf3y6z4x1vqo59h8"},{"url":"http://www.openwall.com/lists/oss-security/2023/06/12/3","refsource":"MISC","name":"http://www.openwall.com/lists/oss-security/2023/06/12/3"},{"url":"http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html","refsource":"MISC","name":"http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html"},{"url":"https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation/","refsource":"MISC","name":"https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation/"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"defect":["NIFI-11653"],"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"Matei \"Mal\" Badanoiu"}]},"nvd":{"publishedDate":"2023-06-12 16:15:00","lastModifiedDate":"2023-10-03 15:44:00","problem_types":["CWE-94"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*","versionStartIncluding":"0.0.2","versionEndExcluding":"1.22.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}