Security researchers have identified a critical vulnerability in Apache HugeGraph, an open-source graph database tool that poses significant risks to systems utilizing this software. The vulnerability, designated as CVE-2024-27348, allows for remote command execution on systems running Java 8 and Java 11. Attackers exploiting this flaw could execute arbitrary code remotely, thereby compromising the security of the installations. This vulnerability is particularly alarming due to the broad usage of the affected Java versions, highlighting the need for immediate action by users of Apache HugeGraph.
The specific vulnerability in question is found in the Apache HugeGraph-Server and is classified under Remote Command Execution (RCE). It is present in environments up to version 1.2.0. To counteract this vulnerability, users are strongly urged to upgrade their systems to Apache HugeGraph-Server version 1.3.0. This new version not only addresses the RCE vulnerability but is also optimized for Java 11, which brings enhanced performance and security features.
Another critical issue identified is CVE-2024-27349, which affects the authentication mechanism of Apache HugeGraph-Server. This flaw allows attackers to bypass authentication protocols by spoofing legitimate user credentials, potentially leading to unauthorized access and control over the server. Like the RCE flaw, this vulnerability affects all versions from the initial release up to version 1.2.0. Users must upgrade to version 1.3.0 immediately, which includes fixes for this authentication bypass issue.
In addition to these critical vulnerabilities, another moderate severity issue identified as CVE-2024-27347 affects the Apache HugeGraph-Hubble. This vulnerability allows for Server-Side Request Forgery (SSRF) in the Hubble Connection Page, which could enable attackers to send crafted requests that may lead to unauthorized actions and information disclosure from internal systems. To mitigate this risk, users should upgrade their Apache HugeGraph-Hubble systems to version 1.3.0. Collectively, these vulnerabilities underscore the importance of maintaining updated systems and implementing robust security measures to protect against potential cyber threats.