Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS00bXBqLTQ4OHItdmg2bc0oDw

Neo4j Graph Database vulnerable to Path Traversal

Impact

Directory Traversal Vulnerabilities found in several functions of apoc plugins in Neo4j Graph database. The attacker can retrieve and download files from outside the configured directory on the affected server. Under some circumstances, the attacker can also create files.

Patches

The users should aim to use the latest released version compatible with their Neo4j version. The minimum versions containing patch for this vulnerability (for Neo4j 4.2, 4.3, and 4.4 bundled with APOC, upgrade to the appropriate patched version):
3.5 - bundle n/a, standalone 3.5.0.17
4.2 - bundle 4.2.13, standalone 4.2.0.10
4.3 - bundle 4.3.9, standalone 4.3.0.4
4.4 - bundle 4.4.2, standalone 4.4.0.1

Workarounds

If you cannot upgrade the library, you can control the allowlist of the functions that can be used in your system:

For more information

If you have any questions or comments about this advisory:

Credits

We want to publicly recognize the contribution of Nicolai Grødum from the Red Team of PwC Norway for reporting this issue and following the responsible disclosure policy.

Permalink: https://github.com/advisories/GHSA-4mpj-488r-vh6m
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00bXBqLTQ4OHItdmg2bc0oDw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: about 2 years ago
Updated: over 1 year ago


CVSS Score: 9.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Identifiers: GHSA-4mpj-488r-vh6m, CVE-2021-42767
References: Repository: https://github.com/neo4j-contrib/neo4j-apoc-procedures
Blast Radius: 15.0

Affected Packages

maven:org.neo4j.procedure:apoc
Dependent packages: 8
Dependent repositories: 44
Downloads:
Affected Version Ranges: = 4.4.0.0, >= 4.3.0.0, <= 4.3.0.3, >= 4.2.0, < 4.2.10, < 3.5.17
Fixed in: 4.4.0.1, 4.3.0.4, 4.2.10, 3.5.17
All affected versions: 1.0.0, 1.1.0
All unaffected versions: