Vulnerabilities (CVE)

Filtered by vendor Tigergraph Subscribe
Filtered by product Tigergraph
Total 8 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-30331 1 Tigergraph 1 Tigergraph 2024-08-03 N/A 8.8 HIGH
The User-Defined Functions (UDF) feature in TigerGraph 3.6.0 allows installation of a query (in the GSQL query language) without proper validation. Consequently, an attacker can execute arbitrary C++ code. NOTE: the vendor's position is "GSQL was behaving as expected."
CVE-2023-28479 1 Tigergraph 1 Tigergraph 2024-02-28 N/A 8.8 HIGH
An issue was discovered in Tigergraph Enterprise 3.7.0. The TigerGraph platform installs a full development toolchain within every TigerGraph deployment. An attacker is able to compile new executables on each Tigergraph system and modify system and Tigergraph binaries.
CVE-2023-28482 1 Tigergraph 1 Tigergraph 2024-02-28 N/A 6.5 MEDIUM
An issue was discovered in Tigergraph Enterprise 3.7.0. A single TigerGraph instance can host multiple graphs that are accessed by multiple different users. The TigerGraph platform does not protect the confidentiality of any data uploaded to the remote server. In this scenario, any user that has permissions to upload data can browse data uploaded by any other user (irrespective of their permissions).
CVE-2023-28480 1 Tigergraph 1 Tigergraph 2024-02-28 N/A 6.5 MEDIUM
An issue was discovered in Tigergraph Enterprise 3.7.0. The TigerGraph platform allows users to define new User Defined Functions (UDFs) from C/C++ code. To support this functionality TigerGraph allows users to upload custom C/C++ code which is then compiled and installed into the platform. An attacker who has filesystem access on a remote TigerGraph system can alter the behavior of the database against the will of the database administrator; thus effectively bypassing the built in RBAC controls.
CVE-2023-28481 1 Tigergraph 1 Tigergraph 2024-02-28 N/A 8.8 HIGH
An issue was discovered in Tigergraph Enterprise 3.7.0. There is unsecured write access to SSH authorized keys file. Any code running as the tigergraph user is able to add their SSH public key into the authorised keys file. This allows an attacker to obtain password-less SSH key access by using their own SSH key.
CVE-2023-28483 1 Tigergraph 1 Tigergraph 2024-02-28 N/A 8.8 HIGH
An issue was discovered in Tigergraph Enterprise 3.7.0. The GSQL query language provides users with the ability to write data to files on a remote TigerGraph server. The locations that a query is allowed to write to are configurable via the GSQL.FileOutputPolicy configuration setting. GSQL queries that contain UDFs can bypass this configuration setting and, as a consequence, can write to any file location to which the administrative user has access.
CVE-2023-22948 1 Tigergraph 1 Tigergraph 2024-02-28 N/A 4.9 MEDIUM
An issue was discovered in TigerGraph Enterprise Free Edition 3.x. There is unsecured read access to an SSH private key. Any code that runs as the tigergraph user is able to read the SSH private key. With this, an attacker is granted password-less SSH access to all machines in the TigerGraph cluster.
CVE-2023-22950 1 Tigergraph 1 Tigergraph 2024-02-28 N/A 6.5 MEDIUM
An issue was discovered in TigerGraph Enterprise Free Edition 3.x. Data loading jobs in gsql_server, created by any user with designer permissions, can read sensitive data from arbitrary locations.