CVE-2023-22951

An issue was discovered in TigerGraph Enterprise Free Edition 3.x. It creates an authentication token for internal systems use. This token can be read from the configuration file. Using this token on the REST API provides an attacker with anonymous admin-level privileges on all REST API endpoints.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:tigergraph:cloud:-:*:*:*:*:*:*:*
cpe:2.3:a:tigergraph:tigergraph_enterprise:3.7.0:*:*:*:free:-:*:*
cpe:2.3:a:tigergraph:tigergraph_enterprise:3.7.0:*:*:*:free:docker:*:*

History

21 Nov 2024, 07:45

Type Values Removed Values Added
References () https://dev.tigergraph.com/forum/c/tg-community/announcements/35 - Product () https://dev.tigergraph.com/forum/c/tg-community/announcements/35 - Product
References () https://neo4j.com/security/cve-2023-22951/ - Exploit, Third Party Advisory () https://neo4j.com/security/cve-2023-22951/ - Exploit, Third Party Advisory

Information

Published : 2023-04-13 20:15

Updated : 2024-11-21 07:45


NVD link : CVE-2023-22951

Mitre link : CVE-2023-22951

CVE.ORG link : CVE-2023-22951


JSON object : View

Products Affected

tigergraph

  • tigergraph_enterprise
  • cloud