{"api_version":"1","generated_at":"2026-04-18T07:53:48+00:00","cve":"CVE-2018-18389","urls":{"html":"https://cve.report/CVE-2018-18389","api":"https://cve.report/api/cve/CVE-2018-18389.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-18389","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-18389"},"summary":{"title":"CVE-2018-18389","description":"Due to incorrect access control in Neo4j Enterprise Database Server 3.4.x before 3.4.9, the setting of LDAP for authentication with STARTTLS, and System Account for authorization, allows an attacker to log into the server by sending any valid username with an arbitrary password.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2018-10-16 18:29:00","updated_at":"2019-01-18 16:25:00"},"problem_types":["CWE-287"],"metrics":[],"references":[{"url":"https://github.com/neo4j/neo4j/issues/12047","name":"https://github.com/neo4j/neo4j/issues/12047","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"Using STARTTLS breaks LDAP authentication · Issue #12047 · neo4j/neo4j · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-18389","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-18389","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"18389","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"neo4j","cpe5":"neo4j","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"18389","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"neo4j","cpe5":"neo4j","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2018-18389","qid":"981067","title":"Java (maven) Security Update for org.neo4j:neo4j-enterprise (GHSA-h5f5-rj4r-42f6)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2018-18389","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Due to incorrect access control in Neo4j Enterprise Database Server 3.4.x before 3.4.9, the setting of LDAP for authentication with STARTTLS, and System Account for authorization, allows an attacker to log into the server by sending any valid username with an arbitrary password."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://github.com/neo4j/neo4j/issues/12047","refsource":"MISC","url":"https://github.com/neo4j/neo4j/issues/12047"}]}},"nvd":{"publishedDate":"2018-10-16 18:29:00","lastModifiedDate":"2019-01-18 16:25:00","problem_types":["CWE-287"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:neo4j:neo4j:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"3.4.0","versionEndExcluding":"3.4.9","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"18389","Ordinal":"135306","Title":"CVE-2018-18389","CVE":"CVE-2018-18389","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"18389","Ordinal":"1","NoteData":"Due to incorrect access control in Neo4j Enterprise Database Server 3.4.x before 3.4.9, the setting of LDAP for authentication with STARTTLS, and System Account for authorization, allows an attacker to log into the server by sending any valid username with an arbitrary password.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"18389","Ordinal":"2","NoteData":"2018-10-16","Type":"Other","Title":"Published"}]}}}