Vulnerability Details : CVE-2022-30331
The User-Defined Functions (UDF) feature in TigerGraph 3.6.0 allows installation of a query (in the GSQL query language) without proper validation. Consequently, an attacker can execute arbitrary C++ code. NOTE: the vendor's position is "GSQL was behaving as expected."
Products affected by CVE-2022-30331
- cpe:2.3:a:tigergraph:tigergraph:3.6.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-30331
0.25%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 46 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-30331
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2022-30331
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-30331
-
https://neo4j.com/security/cve-2022-30331/
TigerGraph: UDF VulnerabilityThird Party Advisory
-
https://docs.tigergraph.com/home/
TigerGraph Documentation :: ExploreProduct;Vendor Advisory
-
https://docs.tigergraph.com/home/cve-2022-30331
Response to CVE-2022-30331 :: ExploreVendor Advisory
Jump to