Vulnerability Description
The User-Defined Functions (UDF) feature in TigerGraph 3.6.0 allows installation of a query (in the GSQL query language) without proper validation. Consequently, an attacker can execute arbitrary C++ code. NOTE: the vendor's position is "GSQL was behaving as expected."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tigergraph | Tigergraph | 3.6.0 |
Related Weaknesses (CWE)
References
- https://docs.tigergraph.com/home/ProductVendor Advisory
- https://docs.tigergraph.com/home/cve-2022-30331Vendor Advisory
- https://neo4j.com/security/cve-2022-30331/Third Party Advisory
- https://docs.tigergraph.com/home/ProductVendor Advisory
- https://docs.tigergraph.com/home/cve-2022-30331Vendor Advisory
- https://neo4j.com/security/cve-2022-30331/Third Party Advisory
FAQ
What is CVE-2022-30331?
CVE-2022-30331 is a vulnerability with a CVSS score of 8.8 (HIGH). The User-Defined Functions (UDF) feature in TigerGraph 3.6.0 allows installation of a query (in the GSQL query language) without proper validation. Consequently, an attacker can execute arbitrary C++ ...
How severe is CVE-2022-30331?
CVE-2022-30331 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-30331?
Check the references section above for vendor advisories and patch information. Affected products include: Tigergraph Tigergraph.