[ https://issues.apache.org/jira/browse/NIFI-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17647688#comment-17647688 ]
David Handermann commented on NIFI-10982: ----------------------------------------- NiFi is not vulnerable to CVE-2016-1000027 because it does not use the Spring Web MVC library in the way described. As Joe noted, NiFi will not be able to move to Spring 6 until Java 17 is the minimum version required. > Update org.springframework_spring-web to 6.0.0 > ---------------------------------------------- > > Key: NIFI-10982 > URL: https://issues.apache.org/jira/browse/NIFI-10982 > Project: Apache NiFi > Issue Type: Improvement > Affects Versions: 1.19.1 > Reporter: Phil Lee > Priority: Major > > Update org.springframework_spring-web from 5.3.24 to 6.0.0. This will > remediate [CVE-2016-1000027|https://nvd.nist.gov/vuln/detail/CVE-2016-1000027] > Twistlock scan reported this as critical severity vulnerability in NiFi > Toolkit (which is included in NiFi version 1.19.1). > Impacted versions: <6.0.0 > Discovered: 2 days ago > Published: more than 2 years ago > Pivotal Spring Framework through 5.3.16 suffers from a potential remote code > execution (RCE) issue if used for Java deserialization of untrusted data. > Depending on how the library is implemented within a product, this issue may > or not occur, and authentication may be required. NOTE: the vendor\'s > position is that untrusted data is not an intended use case. The product\'s > behavior will not be changed because some users rely on deserialization of > trusted data. -- This message was sent by Atlassian Jira (v8.20.10#820010)