ID CVE-2013-7259
Type cve
Reporter cve@mitre.org
Modified 2014-08-04T21:42:00
Description
Multiple cross-site request forgery (CSRF) vulnerabilities in Neo4J 1.9.2 allow remote attackers to hijack the authentication of administrators for requests that execute arbitrary code, as demonstrated by a request to (1) db/data/ext/GremlinPlugin/graphdb/execute_script or (2) db/manage/server/console/.
{"id": "CVE-2013-7259", "bulletinFamily": "NVD", "title": "CVE-2013-7259", "description": "Multiple cross-site request forgery (CSRF) vulnerabilities in Neo4J 1.9.2 allow remote attackers to hijack the authentication of administrators for requests that execute arbitrary code, as demonstrated by a request to (1) db/data/ext/GremlinPlugin/graphdb/execute_script or (2) db/manage/server/console/.", "published": "2014-04-29T14:38:00", "modified": "2014-08-04T21:42:00", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-7259", "reporter": "cve@mitre.org", "references": ["http://www.openwall.com/lists/oss-security/2014/01/03/3", "https://github.com/o2platform/DefCon_RESTing/tree/master/Live-Demos/Neo4j", "http://www.openwall.com/lists/oss-security/2014/01/03/8", "http://blog.diniscruz.com/2013/08/neo4j-csrf-payload-to-start-processes.html"], "cvelist": ["CVE-2013-7259"], "type": "cve", "lastseen": "2020-10-03T12:46:09", "edition": 3, "viewCount": 1, "enchantments": {"dependencies": {"references": [], "modified": "2020-10-03T12:46:09", "rev": 2}, "score": {"value": 7.9, "vector": "NONE", "modified": "2020-10-03T12:46:09", "rev": 2}, "vulnersScore": 7.9}, "cpe": ["cpe:/a:neo4j:neo4j:1.9.2"], "affectedSoftware": [{"cpeName": "neo4j:neo4j", "name": "neo4j", "operator": "eq", "version": "1.9.2"}], "cvss2": {"cvssV2": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true}, "cvss3": {}, "cpe23": ["cpe:2.3:a:neo4j:neo4j:1.9.2:*:*:*:*:*:*:*"], "cwe": ["CWE-78", "CWE-352"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:neo4j:neo4j:1.9.2:*:*:*:*:*:*:*", "vulnerable": true}], "operator": "OR"}]}}
{}