BIT-neo4j-2021-34371

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/neo4j/BIT-neo4j-2021-34371.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-neo4j-2021-34371
Aliases
Published
2024-03-06T10:58:09.184Z
Modified
2024-03-06T11:25:28.861Z
Summary
[none]
Details

Neo4j through 3.4.18 (with the shell server enabled) exposes an RMI service that arbitrarily deserializes Java objects, e.g., through setSessionVariable. An attacker can abuse this for remote code execution because there are dependencies with exploitable gadget chains.

Database specific
{
    "cpes": [
        "cpe:2.3:a:neo4j:neo4j:*:*:*:*:community:*:*:*"
    ],
    "severity": "Critical"
}
References

Affected packages

Bitnami / neo4j

Package

Name
neo4j
Purl
pkg:bitnami/neo4j

Severity

  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4.18