Neo4j : Security vulnerabilities, CVEs (2024)

Copy

APOC (Awesome Procedures on Cypher) is an add-on library for Neo4j. An XML External Entity (XXE) vulnerability found in the apoc.import.graphml procedure of APOC core plugin prior to version 5.5.0 and 4.4.0.14 (4.4 branch) in Neo4j graph database. XML External Entity (XXE) injection occurs when the XML parser allows external entities to be resolved. The XML parser used by the apoc.import.graphml procedure was not configured in a secure way and therefore allowed this. External entities can be used to read local files, send HTTP requests, and perform denial-of-service attacks on the application. Abusing the XXE vulnerability enabled assessors to read local files remotely. Although with the level of privileges assessors had this was limited to one-line files. With the ability to write to the database, any file could have been read. Additionally, assessors noted, with local testing, the server could be crashed by passing in improperly formatted XML. The minimum version containing a patch for this vulnerability is 5.5.0. Those who cannot upgrade the library can control the allowlist of the procedures that can be used in your system.

Source: GitHub, Inc.

Max CVSS

8.1

EPSS Score

0.20%

Published

2023-02-16

Updated

2023-04-14

CVE-2022-37423

Neo4j APOC (Awesome Procedures on Cypher) before 4.3.0.7 and 4.x before 4.4.0.8 allows Directory Traversal to sibling directories via apoc.log.stream.

Source: MITRE

Max CVSS

7.5

EPSS Score

0.22%

Published

2022-08-12

Updated

2022-08-16

CVE-2022-23532

APOC (Awesome Procedures on Cypher) is an add-on library for Neo4j that provides hundreds of procedures and functions. A path traversal vulnerability found in the apoc.export.* procedures of apoc plugins in Neo4j Graph database. The issue allows a malicious actor to potentially break out of the expected directory. The vulnerability is such that files could only be created but not overwritten. For the vulnerability to be exploited, an attacker would need access to execute an arbitrary query, either by having access to an authenticated Neo4j client, or a Cypher injection vulnerability in an application. The minimum versions containing patch for this vulnerability are 4.4.0.12 and 4.3.0.12 and 5.3.1. As a workaround, you can control the allowlist of the procedures that can be used in your system, and/or turn off local file access by setting apoc.export.file.enabled=false.

Source: GitHub, Inc.

Max CVSS

7.1

EPSS Score

0.06%

Published

2023-01-14

Updated

2023-01-24

CVE-2021-42767

A directory traversal vulnerability in the apoc plugins in Neo4J Graph database before 4.4.0.1 allows attackers to read local files, and sometimes create local files. This is fixed in 3.5.17, 4.2.10, 4.3.0.4, and 4.4.0.1.

Source: MITRE

Max CVSS

9.1

EPSS Score

0.24%

Published

2022-03-01

Updated

2022-10-04

CVE-2021-34802

A failure in resetting the security context in some transaction actions in Neo4j Graph Database 4.2 and 4.3 could allow authenticated users to execute commands with elevated privileges.

Source: MITRE

Max CVSS

8.8

EPSS Score

0.10%

Published

2021-07-30

Updated

2021-08-04

CVE-2021-34371

Neo4j through 3.4.18 (with the shell server enabled) exposes an RMI service that arbitrarily deserializes Java objects, e.g., through setSessionVariable. An attacker can abuse this for remote code execution because there are dependencies with exploitable gadget chains.

Source: MITRE

Max CVSS

9.8

EPSS Score

6.88%

Published

2021-08-05

Updated

2021-08-12

CVE-2018-1000820

neo4j-contrib neo4j-apoc-procedures version before commit 45bc09c contains a XML External Entity (XXE) vulnerability in XML Parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This vulnerability appears to have been fixed in after commit 45bc09c.

Source: MITRE

Max CVSS

10.0

EPSS Score

0.23%

Published

2018-12-20

Updated

2023-01-23

CVE-2018-18389

Due to incorrect access control in Neo4j Enterprise Database Server 3.4.x before 3.4.9, the setting of LDAP for authentication with STARTTLS, and System Account for authorization, allows an attacker to log into the server by sending any valid username with an arbitrary password.

Source: MITRE

Max CVSS

9.8

EPSS Score

0.68%

Published

2018-10-16

Updated

2019-01-18

CVE-2013-7259

Multiple cross-site request forgery (CSRF) vulnerabilities in Neo4J 1.9.2 allow remote attackers to hijack the authentication of administrators for requests that execute arbitrary code, as demonstrated by a request to (1) db/data/ext/GremlinPlugin/graphdb/execute_script or (2) db/manage/server/console/.

Source: MITRE

Max CVSS

6.8

EPSS Score

1.00%

Published

2014-04-29

Updated

2014-08-04

Neo4j : Security vulnerabilities, CVEs (2024)
Top Articles
UK Health Insurance Plans for Foreigners
How to pay off your overdraft - Times Money Mentor
Section 4Rs Dodger Stadium
9192464227
Beautiful Scrap Wood Paper Towel Holder
Best Transmission Service Margate
Fnv Turbo
Calamity Hallowed Ore
Craigslist Cars And Trucks Buffalo Ny
Here's how eating according to your blood type could help you keep healthy
Palace Pizza Joplin
Pittsburgh Ultra Advanced Stain And Sealant Color Chart
10 Free Employee Handbook Templates in Word & ClickUp
Nebraska Furniture Tables
272482061
Moviesda3.Com
boohoo group plc Stock (BOO) - Quote London S.E.- MarketScreener
Clear Fork Progress Book
R Cwbt
ELT Concourse Delta: preparing for Module Two
Kamzz Llc
What Channel Is Court Tv On Verizon Fios
Hampton University Ministers Conference Registration
R&S Auto Lockridge Iowa
The Many Faces of the Craigslist Killer
Loslaten met de Sedona methode
Copper Pint Chaska
Pixel Combat Unblocked
2021 Tesla Model 3 Standard Range Pl electric for sale - Portland, OR - craigslist
Amazing Lash Bay Colony
The Rise of "t33n leaks": Understanding the Impact and Implications - The Digital Weekly
Renfield Showtimes Near Marquee Cinemas - Wakefield 12
Los Amigos Taquería Kalona Menu
Slv Fed Routing Number
Old Peterbilt For Sale Craigslist
The Mad Merchant Wow
Personalised Handmade 50th, 60th, 70th, 80th Birthday Card, Sister, Mum, Friend | eBay
Bimmerpost version for Porsche forum?
Cl Bellingham
Legit Ticket Sites - Seatgeek vs Stubhub [Fees, Customer Service, Security]
Puretalkusa.com/Amac
How to Get a Better Signal on Your iPhone or Android Smartphone
Clima De 10 Días Para 60120
Lucifer Morningstar Wiki
Craigslist Rooms For Rent In San Fernando Valley
Ssc South Carolina
Spurs Basketball Reference
15 Best Places to Visit in the Northeast During Summer
Free Carnival-themed Google Slides & PowerPoint templates
The Significance Of The Haitian Revolution Was That It Weegy
Latest Posts
Article information

Author: Stevie Stamm

Last Updated:

Views: 6447

Rating: 5 / 5 (60 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Stevie Stamm

Birthday: 1996-06-22

Address: Apt. 419 4200 Sipes Estate, East Delmerview, WY 05617

Phone: +342332224300

Job: Future Advertising Analyst

Hobby: Leather crafting, Puzzles, Leather crafting, scrapbook, Urban exploration, Cabaret, Skateboarding

Introduction: My name is Stevie Stamm, I am a colorful, sparkling, splendid, vast, open, hilarious, tender person who loves writing and wants to share my knowledge and understanding with you.