CVE-2023-28483

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated TigerGraph users to bypass file output restrictions through GSQL queries containing UDFs (User-Defined Functions). Attackers can write arbitrary files to any location accessible by the TigerGraph administrative user, potentially leading to remote code execution. This affects TigerGraph Enterprise 3.7.0 installations with GSQL query functionality enabled.

💻 Affected Systems

Products:
  • TigerGraph Enterprise
Versions: 3.7.0
Operating Systems: All supported TigerGraph platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires GSQL query functionality with UDF support enabled. Administrative user must have file system write permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via arbitrary file write leading to remote code execution as administrative user, data exfiltration, or complete system takeover.

🟠

Likely Case

Unauthorized file writes to sensitive locations, potential privilege escalation, data manipulation, or denial of service through critical file overwrites.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and file system permissions are implemented to restrict administrative user capabilities.

🌐 Internet-Facing: MEDIUM - Requires authenticated access to GSQL interface, but if exposed externally, could be exploited by authenticated attackers.
🏢 Internal Only: HIGH - Internal attackers with legitimate GSQL access can exploit this to escalate privileges and compromise the entire TigerGraph environment.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated GSQL access and knowledge of UDF creation. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.7.1 or later

Vendor Advisory: https://neo4j.com/security/cve-2023-28483/

Restart Required: Yes

Instructions:

1. Backup TigerGraph data and configurations. 2. Download and install TigerGraph 3.7.1 or later from official vendor sources. 3. Apply the update following vendor documentation. 4. Restart TigerGraph services. 5. Verify GSQL.FileOutputPolicy enforcement is working correctly.

🔧 Temporary Workarounds

Restrict UDF Creation

all

Disable or restrict creation of User-Defined Functions in GSQL queries

# Modify GSQL configuration to restrict UDF usage
# Consult TigerGraph documentation for specific configuration parameters

Limit Administrative User Permissions

linux

Reduce file system permissions for TigerGraph administrative user

# chmod 750 /opt/tigergraph
# chown -R tigergraph:restricted_group /opt/tigergraph
# Set up appropriate SELinux/AppArmor policies

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate TigerGraph servers from critical systems
  • Apply principle of least privilege to TigerGraph administrative user account file system permissions

🔍 How to Verify

Check if Vulnerable:

Check TigerGraph version: gadmin version | grep 'TigerGraph'. If version is 3.7.0, system is vulnerable.

Check Version:

gadmin version | grep 'TigerGraph'

Verify Fix Applied:

After patching, verify version is 3.7.1 or later and test that GSQL queries with UDFs respect FileOutputPolicy restrictions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write operations by TigerGraph processes
  • GSQL queries containing UDF file operations outside configured paths
  • Failed FileOutputPolicy enforcement logs

Network Indicators:

  • Unusual outbound connections from TigerGraph server following GSQL query execution
  • GSQL query patterns attempting file system operations

SIEM Query:

source="tigergraph.log" AND ("file write" OR "UDF" OR "FileOutputPolicy") AND severity=ERROR

🔗 References

📤 Share & Export