FKIE_CVE-2022-30331
Vulnerability from fkie_nvd - Published: 2022-09-05 16:15 - Updated: 2024-11-21 07:02
Severity ?
Summary
The User-Defined Functions (UDF) feature in TigerGraph 3.6.0 allows installation of a query (in the GSQL query language) without proper validation. Consequently, an attacker can execute arbitrary C++ code. NOTE: the vendor's position is "GSQL was behaving as expected."
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://docs.tigergraph.com/home/ | Product, Vendor Advisory | |
| cve@mitre.org | https://docs.tigergraph.com/home/cve-2022-30331 | Vendor Advisory | |
| cve@mitre.org | https://neo4j.com/security/cve-2022-30331/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://docs.tigergraph.com/home/ | Product, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://docs.tigergraph.com/home/cve-2022-30331 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://neo4j.com/security/cve-2022-30331/ | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| tigergraph | tigergraph | 3.6.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tigergraph:tigergraph:3.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EF79797A-59E3-49A7-A7F5-CBCC064BAF48",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The User-Defined Functions (UDF) feature in TigerGraph 3.6.0 allows installation of a query (in the GSQL query language) without proper validation. Consequently, an attacker can execute arbitrary C++ code. NOTE: the vendor\u0027s position is \"GSQL was behaving as expected.\""
},
{
"lang": "es",
"value": "** EN DISPUTA ** La funcionalidad de Funciones Definidas por el Usuario (UDF) en TigerGraph versi\u00f3n 3.6.0, permite una instalaci\u00f3n de una consulta (en el lenguaje de consulta GSQL) sin la comprobaci\u00f3n apropiada. En consecuencia, un atacante puede ejecutar c\u00f3digo C++ arbitrario. NOTA: la posici\u00f3n del proveedor es \"GSQL era comportada como era esperado\""
}
],
"id": "CVE-2022-30331",
"lastModified": "2024-11-21T07:02:36.307",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-09-05T16:15:08.450",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://docs.tigergraph.com/home/"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://docs.tigergraph.com/home/cve-2022-30331"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://neo4j.com/security/cve-2022-30331/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://docs.tigergraph.com/home/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://docs.tigergraph.com/home/cve-2022-30331"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://neo4j.com/security/cve-2022-30331/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…