CVE-2013-7259: Neo4J vulnerable to Cross-Site Request Forgery
(updated )
Multiple cross-site request forgery (CSRF) vulnerabilities in Neo4J 1.9.2 allow remote attackers to hijack the authentication of administrators for requests that execute arbitrary code, as demonstrated by a request to (1) db/data/ext/GremlinPlugin/graphdb/execute_script or (2) db/manage/server/console/.
References
- github.com/advisories/GHSA-x626-q4v7-7xc6
- github.com/neo4j/neo4j
- github.com/neo4j/neo4j/commit/40ad76078a25666d8b218772b6491fb443020df9
- github.com/neo4j/neo4j/issues/2826
- github.com/o2platform/DefCon_RESTing/tree/master/Live-Demos/Neo4j
- nvd.nist.gov/vuln/detail/CVE-2013-7259
- web.archive.org/web/20131017043717/http://blog.diniscruz.com/2013/08/neo4j-csrf-payload-to-start-processes.html
Code Behaviors & Features
Detect and mitigate CVE-2013-7259 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →