CVE-2023-22951
Published Apr 13, 2023
Last updated 2 years ago
Overview
- Description
- An issue was discovered in TigerGraph Enterprise Free Edition 3.x. It creates an authentication token for internal systems use. This token can be read from the configuration file. Using this token on the REST API provides an attacker with anonymous admin-level privileges on all REST API endpoints.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:tigergraph:cloud:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51757E82-0551-48EB-9F73-7141B03D6D87" }, { "criteria": "cpe:2.3:a:tigergraph:tigergraph_enterprise:3.7.0:*:*:*:free:-:*:*", "vulnerable": true, "matchCriteriaId": "E4FF3A96-AA5F-4DA6-BBE9-37C5A1C11279" }, { "criteria": "cpe:2.3:a:tigergraph:tigergraph_enterprise:3.7.0:*:*:*:free:docker:*:*", "vulnerable": true, "matchCriteriaId": "35459185-6569-4F54-B338-0355DF5ECC50" } ], "operator": "OR" } ] } ]