A high-severity Remote Code Execution (RCE) vulnerability, CVE-2024-27348, has been identified in Apache HugeGraph Server, affecting versions prior to 1.3.0. This vulnerability allows attackers to bypass sandbox restrictions and execute remote code, posing significant risks to organizations using the affected software. The vulnerability has a critical CVSS score of 9.8 and can lead to complete control of the server by attackers.
Apache HugeGraph, developed by Baidu, is an open-source graph database designed to manage large-scale graph data and complex queries. The vulnerability, which exploits the Gremlin graph traversal language, is particularly concerning given the extensive use of HugeGraph in handling massive datasets. The patch for this vulnerability addresses key issues by enhancing security measures in several critical files, including LoginAPI.java and HugeFactoryAuthProxy.java.
A proof-of-concept (PoC) exploit has been released, demonstrating how attackers can exploit the vulnerability by bypassing security checks and executing malicious code. The exploit manipulates the SecurityManager’s missing reflection filtering, allowing unauthorized actions such as creating directories or executing commands on the server. This highlights the severe implications of the vulnerability for organizations relying on affected versions of HugeGraph.
Organizations using Apache HugeGraph are strongly advised to update to version 1.3.0 or later to mitigate the risk of exploitation. This incident underscores the importance of timely patching and robust security measures in safeguarding systems and data. The quick response from the cybersecurity community in addressing this vulnerability emphasizes the need for collaboration in defending against high-severity threats.
Reference: