
Cloud Vulnerability DB
A community-led vulnerabilities database
The User-Defined Functions (UDF) feature in TigerGraph 3.6.0 allows installation of a query (in the GSQL query language) without proper validation, potentially enabling arbitrary C++ code execution. This vulnerability has been assigned CVE-2022-30331 with a CVSS v3.1 base score of 8.8 (High) (AttackerKB, TigerGraph Docs).
The vulnerability exists in TigerGraph's UDF feature which allows creation of custom functions in native C++ for high-speed data manipulation. The CVSS metrics indicate Network attack vector, Low attack complexity, Low privileges required, and No user interaction needed. The vulnerability impacts Confidentiality, Integrity, and Availability, all rated as High (AttackerKB).
If exploited, this vulnerability could allow an attacker to execute arbitrary C++ code within the TigerGraph environment. The impact is significant with potential for unauthorized access, data manipulation, and system compromise. However, the vendor notes that this requires superuser access and proper code review processes should prevent malicious code installation (TigerGraph Docs).
TigerGraph has implemented several mitigations: 1) Starting with version 3.8.0, UDF uploading is disabled by default and requires administrator privileges to enable. 2) Version 3.9.0 introduced UDF File Scanning that blocks certain C++ code from being loaded. Additional recommended security measures include proper credential configuration, limiting WRITE_FILE privileges to trusted users, implementing secure software development lifecycle processes, and ensuring proper security of GitHub repositories if used for UDF storage (TigerGraph Docs).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."