CVE-2023-28483
📋 TL;DR
This vulnerability allows authenticated TigerGraph users to bypass file output restrictions through GSQL queries containing UDFs (User-Defined Functions). Attackers can write arbitrary files to any location accessible by the TigerGraph administrative user, potentially leading to remote code execution. This affects TigerGraph Enterprise 3.7.0 installations with GSQL query functionality enabled.
💻 Affected Systems
- TigerGraph Enterprise
📦 What is this software?
Tigergraph by Tigergraph
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise via arbitrary file write leading to remote code execution as administrative user, data exfiltration, or complete system takeover.
Likely Case
Unauthorized file writes to sensitive locations, potential privilege escalation, data manipulation, or denial of service through critical file overwrites.
If Mitigated
Limited impact if proper network segmentation, least privilege access, and file system permissions are implemented to restrict administrative user capabilities.
🎯 Exploit Status
Requires authenticated GSQL access and knowledge of UDF creation. No public exploit code available at time of analysis.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.7.1 or later
Vendor Advisory: https://neo4j.com/security/cve-2023-28483/
Restart Required: Yes
Instructions:
1. Backup TigerGraph data and configurations. 2. Download and install TigerGraph 3.7.1 or later from official vendor sources. 3. Apply the update following vendor documentation. 4. Restart TigerGraph services. 5. Verify GSQL.FileOutputPolicy enforcement is working correctly.
🔧 Temporary Workarounds
Restrict UDF Creation
allDisable or restrict creation of User-Defined Functions in GSQL queries
# Modify GSQL configuration to restrict UDF usage
# Consult TigerGraph documentation for specific configuration parameters
Limit Administrative User Permissions
linuxReduce file system permissions for TigerGraph administrative user
# chmod 750 /opt/tigergraph
# chown -R tigergraph:restricted_group /opt/tigergraph
# Set up appropriate SELinux/AppArmor policies
🧯 If You Can't Patch
- Implement strict network segmentation to isolate TigerGraph servers from critical systems
- Apply principle of least privilege to TigerGraph administrative user account file system permissions
🔍 How to Verify
Check if Vulnerable:
Check TigerGraph version: gadmin version | grep 'TigerGraph'. If version is 3.7.0, system is vulnerable.
Check Version:
gadmin version | grep 'TigerGraph'
Verify Fix Applied:
After patching, verify version is 3.7.1 or later and test that GSQL queries with UDFs respect FileOutputPolicy restrictions.
📡 Detection & Monitoring
Log Indicators:
- Unusual file write operations by TigerGraph processes
- GSQL queries containing UDF file operations outside configured paths
- Failed FileOutputPolicy enforcement logs
Network Indicators:
- Unusual outbound connections from TigerGraph server following GSQL query execution
- GSQL query patterns attempting file system operations
SIEM Query:
source="tigergraph.log" AND ("file write" OR "UDF" OR "FileOutputPolicy") AND severity=ERROR