Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXIycHAteDRtbS00OTk5
XML External Entity (XXE) vulnerability in neo4j.procedure:apoc
neo4j-contrib neo4j-apoc-procedures version before commit 45bc09c contains a XML External Entity (XXE) vulnerability in XML Parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This vulnerability appears to have been fixed in after commit 45bc09c.
Permalink: https://github.com/advisories/GHSA-r2pp-x4mm-4999JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXIycHAteDRtbS00OTk5
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: almost 6 years ago
Updated: almost 2 years ago
CVSS Score: 10.0
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Identifiers: GHSA-r2pp-x4mm-4999, CVE-2018-1000820
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-1000820
- https://github.com/neo4j-contrib/neo4j-apoc-procedures/issues/931
- https://0dd.zone/2018/10/27/neo4f-apoc-procedures-XXE/
- https://github.com/advisories/GHSA-r2pp-x4mm-4999
Blast Radius: 16.4
Affected Packages
maven:org.neo4j.procedure:apoc
Dependent packages: 8Dependent repositories: 44
Downloads:
Affected Version Ranges: <= 3.4.0.3
Fixed in: 3.4.0.4
All affected versions:
All unaffected versions: 1.0.0, 1.1.0