CVE-2013-7259

Multiple cross-site request forgery (CSRF) vulnerabilities in Neo4J 1.9.2 allow remote attackers to hijack the authentication of administrators for requests that execute arbitrary code, as demonstrated by a request to (1) db/data/ext/GremlinPlugin/graphdb/execute_script or (2) db/manage/server/console/.
Configurations

Configuration 1 (hide)

cpe:2.3:a:neo4j:neo4j:1.9.2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:00

Type Values Removed Values Added
References () http://blog.diniscruz.com/2013/08/neo4j-csrf-payload-to-start-processes.html - () http://blog.diniscruz.com/2013/08/neo4j-csrf-payload-to-start-processes.html -
References () http://www.openwall.com/lists/oss-security/2014/01/03/3 - () http://www.openwall.com/lists/oss-security/2014/01/03/3 -
References () http://www.openwall.com/lists/oss-security/2014/01/03/8 - () http://www.openwall.com/lists/oss-security/2014/01/03/8 -
References () https://github.com/o2platform/DefCon_RESTing/tree/master/Live-Demos/Neo4j - () https://github.com/o2platform/DefCon_RESTing/tree/master/Live-Demos/Neo4j -

Information

Published : 2014-04-29 14:38

Updated : 2025-04-12 10:46


NVD link : CVE-2013-7259

Mitre link : CVE-2013-7259

CVE.ORG link : CVE-2013-7259


JSON object : View

Products Affected

neo4j

  • neo4j
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-352

Cross-Site Request Forgery (CSRF)