GHSA-9vx8-f5c4-862x: XML External Entity (XXE) vulnerability in apoc.import.graphml
5.9
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
2/24/2023
Updated
3/31/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.neo4j.procedure:apoc | maven | < 4.4.0.14 | 4.4.0.14 |
org.neo4j.procedure:apoc | maven | >= 5.0.0, < 5.5.0 | 5.5.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the XML parser configuration in XmlGraphMLReader.java. The pre-patch code created an XMLInputFactory without disabling DTD support (SUPPORT_DTD=true) and allowed external entities (IS_SUPPORTING_EXTERNAL_ENTITIES=true). This insecure configuration is directly modified in the security patch by setting these properties to false. The parseXML method is the entry point for XML processing in the vulnerable apoc.import.graphml procedure, making it the clear attack vector. The added DTD event check and exception further confirm this was the vulnerable code path.