apoc is vulnerable to Insertion of Sensitive Information into Log File
15
Low Risk
Affected versions of this package actively expose sensitive information in log files by improperly logging the JDBC password in query.log. This vulnerability allows for the unintentional disclosure of sensitive data, potentially leading to security risks such as unauthorized access or leakage of private information.
You are affected if you are using a version that falls within the vulnerable range.
apoc is vulnerable to Insertion of Sensitive Information into Log File in versions 3.2.0.4 - 4.4.0.34 and 5.0.0 - 5.25.0.
Upgrade the org.neo4j.procedure:apoc library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant