Neo4j through 3.4.18 (with the shell server enabled) exposes an RMI service that arbitrarily deserializes Java objects, e.g., through setSessionVariable. An attacker can abuse this for remote code execution because there are dependencies with exploitable gadget chains.
References
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2021-08-05T19:35:05

Updated: 2024-08-04T00:12:49.674Z

Reserved: 2021-06-09T00:00:00

Link: CVE-2021-34371

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2021-08-05T20:15:09.280

Modified: 2021-08-12T17:44:57.840

Link: CVE-2021-34371

cve-icon Redhat

No data.