Description
Neo4j through 3.4.18 (with the shell server enabled) exposes an RMI service that arbitrarily deserializes Java objects, e.g., through setSessionVariable. An attacker can abuse this for remote code execution because there are dependencies with exploitable gadget chains.
Remediation
References
https://www.exploit-db.com/exploits/50170
Related Vulnerabilities
CVE-2018-11011 Vulnerability in maven package cc.ryanc:halo
CVE-2020-7673 Vulnerability in npm package node-extend
CVE-2022-36904 Vulnerability in maven package org.jenkins-ci.plugins:repository-connector
CVE-2023-40809 Vulnerability in maven package org.opencrx:opencrx-core-models
CVE-2023-40342 Vulnerability in maven package org.jenkins-ci.plugins:flaky-test-handler