{ "id": "CVE-2021-42767", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-01T02:15:07.370", "lastModified": "2022-10-04T14:48:17.553", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A directory traversal vulnerability in the apoc plugins in Neo4J Graph database before 4.4.0.1 allows attackers to read local files, and sometimes create local files. This is fixed in 3.5.17, 4.2.10, 4.3.0.4, and 4.4.0.1." }, { "lang": "es", "value": "Una vulnerabilidad de cruce de directorios en los plugins apoc de la base de datos Neo4J Graph antes de la versi\u00f3n 4.4.0.1 permite a los atacantes leer archivos locales y, en ocasiones, crear archivos locales. Esto se ha corregido en las versiones 3.5.17, 4.2.10, 4.3.0.4 y 4.4.0.1" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL" }, "exploitabilityScore": 3.9, "impactScore": 5.2 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 6.4 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 4.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-22" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:neo4j:awesome_procedures:*:*:*:*:*:neo4j:*:*", "versionEndExcluding": "3.5.0.17", "matchCriteriaId": "04D6D30D-DAC3-4424-8BC1-614D8261BB21" }, { "vulnerable": true, "criteria": "cpe:2.3:a:neo4j:awesome_procedures:*:*:*:*:*:neo4j:*:*", "versionStartIncluding": "4.2.0.0", "versionEndExcluding": "4.2.10", "matchCriteriaId": "4EA2444C-7672-43E5-B95B-0B1F41D7C4B4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:neo4j:awesome_procedures:*:*:*:*:*:neo4j:*:*", "versionStartIncluding": "4.3.0.0", "versionEndExcluding": "4.3.0.4", "matchCriteriaId": "74F7C960-D2B5-4E8A-B98B-A4FB52DC4C88" }, { "vulnerable": true, "criteria": "cpe:2.3:a:neo4j:awesome_procedures:*:*:*:*:*:neo4j:*:*", "versionStartIncluding": "4.4.0.0", "versionEndExcluding": "4.4.0.1", "matchCriteriaId": "61E31177-96CD-47EF-BE4B-7AA0C12F154D" } ] } ] } ], "references": [ { "url": "https://github.com/neo4j-contrib/neo4j-apoc-procedures/security/advisories/GHSA-4mpj-488r-vh6m", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://neo4j.com", "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ] } ] }