An issue was discovered in TigerGraph Enterprise Free Edition 3.x. It creates an authentication token for internal systems use. This token can be read from the configuration file. Using this token on the REST API provides an attacker with anonymous admin-level privileges on all REST API endpoints.
During installation, installed file permissions are set to allow anyone to modify those files.
Link | Tags |
---|---|
https://dev.tigergraph.com/forum/c/tg-community/announcements/35 | product |
https://neo4j.com/security/cve-2023-22951/ | third party advisory exploit |