Miggo Logo

GHSA-9vx8-f5c4-862x: XML External Entity (XXE) vulnerability in apoc.import.graphml

5.9

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
2/24/2023
Updated
3/31/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.neo4j.procedure:apocmaven< 4.4.0.144.4.0.14
org.neo4j.procedure:apocmaven>= 5.0.0, < 5.5.05.5.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the XML parser configuration in XmlGraphMLReader.java. The pre-patch code created an XMLInputFactory without disabling DTD support (SUPPORT_DTD=true) and allowed external entities (IS_SUPPORTING_EXTERNAL_ENTITIES=true). This insecure configuration is directly modified in the security patch by setting these properties to false. The parseXML method is the entry point for XML processing in the vulnerable apoc.import.graphml procedure, making it the clear attack vector. The added DTD event check and exception further confirm this was the vulnerable code path.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t * XML *xt*rn*l *ntity (XX*) vuln*r**ility *oun* in t** *po*.import.*r*p*ml pro***ur* o* *PO* *or* plu*in in N*o*j *r*p* **t***s*. XML *xt*rn*l *ntity (XX*) inj**tion o**urs w**n t** XML p*rs*r *llows *xt*rn*l *ntiti*s to ** r*solv**. T** X

Reasoning

T** vuln*r**ility st*ms *rom t** XML p*rs*r *on*i*ur*tion in Xml*r*p*MLR****r.j*v*. T** pr*-p*t** *o** *r**t** *n XMLInput***tory wit*out *is**lin* *T* support (SUPPORT_*T*=tru*) *n* *llow** *xt*rn*l *ntiti*s (IS_SUPPORTIN*_*XT*RN*L_*NTITI*S=tru*). T