An issue was discovered in TigerGraph Enterprise Free Edition 3.x. There is logging of user credentials. All authenticated GSQL access requests are logged by TigerGraph in multiple places. Each request includes both the username and password of the user in an easily decodable base64 form. That could allow a TigerGraph administrator to effectively harvest usernames/passwords.
References
Link | Resource |
---|---|
https://dev.tigergraph.com/forum/c/tg-community/announcements/35 | Product |
https://neo4j.com/security/cve-2023-22949/ | Exploit Third Party Advisory |
https://dev.tigergraph.com/forum/c/tg-community/announcements/35 | Product |
https://neo4j.com/security/cve-2023-22949/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://dev.tigergraph.com/forum/c/tg-community/announcements/35 - Product | |
References | () https://neo4j.com/security/cve-2023-22949/ - Exploit, Third Party Advisory |
Information
Published : 2023-04-14 14:15
Updated : 2024-11-21 07:45
NVD link : CVE-2023-22949
Mitre link : CVE-2023-22949
CVE.ORG link : CVE-2023-22949
JSON object : View
Products Affected
tigergraph
- tigergraph_enterprise
- cloud
CWE
CWE-312
Cleartext Storage of Sensitive Information