CVE-2021-42767
Summary
| CVE | CVE-2021-42767 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-03-01 02:15:00 UTC |
| Updated | 2022-10-04 14:48:00 UTC |
| Description | A directory traversal vulnerability in the apoc plugins in Neo4J Graph database before 4.4.0.1 allows attackers to read local files, and sometimes create local files. This is fixed in 3.5.17, 4.2.10, 4.3.0.4, and 4.4.0.1. |
Risk And Classification
Problem Types: CWE-22
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Neo4j | Awesome Procedures | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Path traversal in several apoc.* functions · Advisory · neo4j-contrib/neo4j-apoc-procedures · GitHub | MISC | github.com | |
| Graph Data Platform | Graph Database Management System | Neo4j | MISC | neo4j.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.