# Apache Camel Neo4j 蓝图注入漏洞
## 概述
Apache Camel camel-neo4j 组件存在 Cypher 注入漏洞,攻击者可利用该漏洞在目标 Neo4j 数据库中执行恶意 Cypher 查询。
## 影响版本
- Apache Camel 4.10.0 至 4.10.7
- Apache Camel 4.14.0 至 4.14.2
- Apache Camel 4.15.0 至 4.16.0(不包含 4.17.0)
## 细节
该漏洞存在于 camel-neo4j 组件中,由于未正确验证或转义用户输入的 Cypher 查询语句,导致攻击者可通过构造恶意输入执行任意 Cypher 命令,从而可能读取、修改或删除 Neo4j 数据库中的数据。
## 影响
- 可能导致数据库信息泄露
- 可能导致数据篡改或删除
- 可能被用于进一步的权限提升或内网渗透
**解决方案:** 建议用户升级至 4.10.8(4.10.x LTS)、4.14.3(4.14.x LTS)或 4.17.0 及以上版本。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: Apache Camel Security Advisory - CVE-2025-66169 - Apache Camel -- 🔗来源链接
标签:vendor-advisory
神龙速读:
- **SEVERITY**: MEDIUM
- **SUMMARY**: Cypher injection vulnerability in Camel-Neo4j component
- **VERSIONS AFFECTED**: Apache Camel 4.10.x before 4.10.8, Apache Camel 4.14.x before 4.14.3, Apache Camel 4.15.0 and 4.16.0.
- **VERSIONS FIXED**: 4.10.8, 4.14.3 and 4.17.0
- **DESCRIPTION**: Camel neo4j component is vulnerable to Cypher injection: attackers can construct specific query statements to execute unintended operations in the Neo4j database.
- **MITIGATION**: Users are recommended to upgrade to version 4.10.8 for 4.10.x LTS and 4.14.3 for 4.14.x LTS and 4.17.0.
- **CREDIT**: This issue was discovered and reported by Ya0H4cker.
- **REFERENCES**:
- **PGP signed advisory data**: [CVE-2025-66169.txt.asc](CVE-2025-66169.txt.asc)
- **Mitre CVE Entry**: [https://www.cve.org/CVERecord?id=CVE-2025-66169](https://www.cve.org/CVERecord?id=CVE-2025-66169)
Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.