cvelist/2021/42xxx/CVE-2021-42767.json

67 lines
2.1 KiB
JSON
Raw Normal View History

2021-10-20 20:00:53 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2022-03-01 02:01:21 +00:00
"ID": "CVE-2021-42767",
"STATE": "PUBLIC"
2021-10-20 20:00:53 +00:00
},
2022-03-01 02:01:21 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-10-20 20:00:53 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2022-03-10 17:24:02 +00:00
"value": "A directory traversal vulnerability in the apoc plugins in Neo4J Graph database before 4.4.0.1 allows attackers to read local files, and sometimes create local files. This is fixed in 3.5.17, 4.2.10, 4.3.0.4, and 4.4.0.1."
2022-03-01 02:01:21 +00:00
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://neo4j.com",
"refsource": "MISC",
"name": "https://neo4j.com"
},
{
"refsource": "MISC",
"name": "https://github.com/neo4j-contrib/neo4j-apoc-procedures/security/advisories/GHSA-4mpj-488r-vh6m",
"url": "https://github.com/neo4j-contrib/neo4j-apoc-procedures/security/advisories/GHSA-4mpj-488r-vh6m"
2021-10-20 20:00:53 +00:00
}
]
}
}