CVE-2022-37423

Neo4j APOC (Awesome Procedures on Cypher) before 4.3.0.7 and 4.x before 4.4.0.8 allows Directory Traversal to sibling directories via apoc.log.stream.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:neo4j:awesome_procedures_on_cypher:*:*:*:*:*:*:*:*
cpe:2.3:a:neo4j:awesome_procedures_on_cypher:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:14

Type Values Removed Values Added
References () https://github.com/neo4j-contrib/neo4j-apoc-procedures/security/advisories/GHSA-78f9-745f-278p - Exploit, Third Party Advisory () https://github.com/neo4j-contrib/neo4j-apoc-procedures/security/advisories/GHSA-78f9-745f-278p - Exploit, Third Party Advisory
References () https://neo4j.com/docs/aura/platform/apoc/ - Product, Vendor Advisory () https://neo4j.com/docs/aura/platform/apoc/ - Product, Vendor Advisory

Information

Published : 2022-08-12 15:15

Updated : 2024-11-21 07:14


NVD link : CVE-2022-37423

Mitre link : CVE-2022-37423

CVE.ORG link : CVE-2022-37423


JSON object : View

Products Affected

neo4j

  • awesome_procedures_on_cypher
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')