An issue was discovered in TigerGraph Enterprise Free Edition 3.x. It creates an authentication token for internal systems use. This token can be read from the configuration file. Using this token on the REST API provides an attacker with anonymous admin-level privileges on all REST API endpoints.
References
Link | Resource |
---|---|
https://dev.tigergraph.com/forum/c/tg-community/announcements/35 | Product |
https://neo4j.com/security/cve-2023-22951/ | Exploit Third Party Advisory |
https://dev.tigergraph.com/forum/c/tg-community/announcements/35 | Product |
https://neo4j.com/security/cve-2023-22951/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://dev.tigergraph.com/forum/c/tg-community/announcements/35 - Product | |
References | () https://neo4j.com/security/cve-2023-22951/ - Exploit, Third Party Advisory |
Information
Published : 2023-04-13 20:15
Updated : 2024-11-21 07:45
NVD link : CVE-2023-22951
Mitre link : CVE-2023-22951
CVE.ORG link : CVE-2023-22951
JSON object : View
Products Affected
tigergraph
- tigergraph_enterprise
- cloud
CWE