<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Graph-Database — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/graph-database/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 Nov 2024 18:23:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/graph-database/feed.xml" rel="self" type="application/rss+xml"/><item><title>NornicDB Improper Network Binding Exposes Bolt Server</title><link>https://feed.craftedsignal.io/briefs/2024-11-nornicdb-bolt-binding/</link><pubDate>Sat, 02 Nov 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-nornicdb-bolt-binding/</guid><description>NornicDB versions prior to 1.0.42-hotfix have an improper network binding vulnerability in its Bolt server, allowing unauthorized remote access because the `--address` CLI flag is not correctly plumbed through to the Bolt server config, causing the Bolt listener to always bind to the wildcard address and expose the database with default credentials.</description><content:encoded><![CDATA[<p>NornicDB versions prior to 1.0.42-hotfix are vulnerable to an improper network binding issue affecting the Bolt server. The vulnerability stems from the <code>--address</code> CLI flag (and <code>NORNICDB_ADDRESS</code> / <code>server.host</code> config key) not being correctly applied to the Bolt server configuration. Consequently, the Bolt listener always binds to the wildcard address (0.0.0.0), irrespective of user-defined configurations. This default behavior exposes the graph database with its default <code>admin:password</code> credentials to unauthorized access. An attacker on the same network can exploit this vulnerability to issue arbitrary Cypher queries, potentially leading to unauthorized data access, modification, or deletion. This issue was identified in version 1.0.39, built from commit afe7c9d, on macOS (darwin 25.4.0, arm64).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a NornicDB instance running on a local network (LAN).</li>
<li>The attacker scans the network for open port 7687, the default Bolt port, on the target machine.</li>
<li>The attacker connects to the open Bolt port (7687) on the target NornicDB instance using <code>nc -z 192.168.x.y 7687</code>.</li>
<li>The attacker attempts to authenticate to the Bolt server using the default credentials <code>admin:password</code>.</li>
<li>Upon successful authentication, the attacker issues arbitrary Cypher queries to read, write, or delete nodes within the graph database.</li>
<li>The attacker exfiltrates sensitive data from the database using Cypher queries.</li>
<li>The attacker modifies or deletes critical data within the database, causing data integrity issues or service disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability allows unauthorized remote access to NornicDB instances with default configurations. Attackers can exploit this flaw to issue arbitrary Cypher queries, potentially leading to complete database compromise. If the NornicDB instance contains sensitive information, successful exploitation could result in data breaches, financial losses, and reputational damage. Users following the README and reasonably assuming that <code>--address 127.0.0.1</code> (the documented default) binds <em>both</em> protocols to localhost are particularly at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade NornicDB to version 1.0.42-hotfix or later to patch the improper network binding vulnerability.</li>
<li>Apply host-firewall rules (e.g., macOS <code>pf</code>) blocking non-loopback connections to port 7687 as a workaround until the upgrade can be performed, as suggested in the advisory.</li>
<li>Deploy the Sigma rule <code>Detect NornicDB Bolt Server Wildcard Binding</code> to identify instances with exposed Bolt ports on all interfaces.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>network-binding</category><category>misconfiguration</category><category>graph-database</category></item></channel></rss>