目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2026-42072 — 神龙十问 AI 深度分析摘要

CVSS 9.8 · Critical

Q1这个漏洞是什么?(本质+后果)

- 🚨 **CVE-2026-42072**: NornicDB Bolt Server binds to all interfaces by default. >- Even with config set, **Bolt port** listens on `0.0.0.0`. >- 🔓 Exposes DB & **default admin:password** in LAN.…

Q2根本原因?(CWE/缺陷点)

- 🛠️ **Root Cause**: Config not passed to Bolt server. >- `--address` & env vars work for HTTP ✅ but NOT for Bolt ❌. >- 🧱 Likely **CWE-400**: Uncontrolled Resource Consumption / Exposure.…

Q3影响谁?(版本/组件)

- 🎯 **Affected**: NornicDB versions **< 1.0.42-hotfix**. >- 📦 Component: **Bolt Server** (graph traversal & write API). >- 🖥️ Any OS running vulnerable version in LAN.

Q4黑客能干啥?(权限/数据)

- 🕵️ **Attackers** in LAN can: > - 🔓 Login via **admin/password**. > - 📂 Read/modify **graph & vector data**. > - ⚙️ Execute **write ops & traversals**. >- 💀 **Privilege**: Full control (no auth needed).

Q5利用门槛高吗?(认证/配置)

- 🟢 **Exploitation threshold LOW**. >- 🚪 No auth needed. >- 🌐 Just need LAN access. >- ⚙️ Works even if user tried to restrict binding.

Q6有现成Exp吗?(PoC/在野利用)

- 🔍 **No public PoC** listed. >- `pocs`: empty. >- ❌ Not marked as exploited in wild (per data). >- 📉 But risk still HIGH due to simplicity.

Q7怎么自查?(特征/扫描)

- 🧪 **Self-check steps**: > - Run `netstat -tulnp` or `ss -ltnp`. > - Check if Bolt port (default?) binds to `0.0.0.0`. > - ✅ Confirm version < 1.0.42-hotfix.…

Q8官方修了吗?(补丁/缓解)

- ✅ **Fixed in v1.0.42-hotfix**. >- 🔧 Commit: `adce4f9a`. >- 📢 Advisory: [GHSA-2hp7-65r3-wv54](https://github.com/orneryd/NornicDB/security/advisories/GHSA-2hp7-65r3-wv54).…

Q9没补丁咋办?(临时规避)

- 🚧 **If no patch**: > - 🔥 Block Bolt port via firewall (LAN-level). > - 🚫 Disable Bolt if unused. > - 🔐 Change default `admin` password ASAP (if accessible). > - 🏗️ Isolate NornicDB host in private VLAN.

Q10急不急?(优先级建议)

- 🚨 **Urgent: YES**. >- 🔺 CVSS: **9.8 (Critical)** → `AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`. >- 📍 Trivial to exploit in LAN. >- 💡 Patch immediately or apply strict network controls.