GHSA-2HP7-65R3-WV54
Vulnerability from github – Published: 2026-04-22 22:03 – Updated: 2026-04-22 22:03Summary
The --address CLI flag (and NORNICDB_ADDRESS / server.host config key) is plumbed through to the HTTP server correctly but never reaches the Bolt server config. The Bolt listener therefore always binds to the wildcard address (all interfaces), regardless of what the user configures.
On a LAN, this exposes the graph database — with its default admin:password credentials — to any device sharing the network.
Version
nornicdb v1.0.39- Built from commit
afe7c9donmain - Platform: macOS (darwin 25.4.0, arm64)
Reproduction
$ nornicdb serve --address 127.0.0.1 --bolt-port 7687 --http-port 7474 ...
Output claims Bolt is on localhost:
Bolt server listening on bolt://localhost:7687
But the actual socket:
$ netstat -an -p tcp | grep 7687
tcp46 0 0 *.7687 *.* LISTEN
$ lsof -iTCP:7687 -sTCP:LISTEN -n -P
nornicdb ... IPv6 ... TCP *:7687 (LISTEN)
HTTP port is correctly bound:
tcp4 127.0.0.1.7474 *.* LISTEN
Reachable from another host on the LAN:
$ nc -z 192.168.x.y 7687
Connection to 192.168.x.y port 7687 [tcp/*] succeeded!
Setting NORNICDB_BOLT_ADDRESS=127.0.0.1 or server.host: "127.0.0.1" in config.yaml has no effect on the Bolt listener.
Root Cause
In pkg/bolt/server.go:774-776:
func (s *Server) ListenAndServe() error {
addr := fmt.Sprintf(":%d", s.config.Port)
listener, err := net.Listen("tcp", addr)
...
}
bolt.Config (line 474) has no Host/Address/Addr field — only Port. The CLI flag --address is stored in a local variable in cmd/nornicdb/main.go:80 and used to format user-facing log output (line 637–644), but is never copied into boltConfig at line 600–609 when Bolt is initialized.
Since ListenAndServe calls net.Listen("tcp", ":7687") with an empty host, Go binds the wildcard socket on all interfaces.
Suggested Fix
- Add a
Host stringfield tobolt.Config(default"127.0.0.1", matching the CLI flag default). - In
cmd/nornicdb/main.goaround line 601, wire it through:go boltConfig.Host = address boltConfig.Port = boltPort - In
pkg/bolt/server.go:775, use the host:go addr := net.JoinHostPort(s.config.Host, strconv.Itoa(s.config.Port))
Security Impact
- Default
admin:passwordcredentials + wildcard binding = anyone on the same WiFi can issue arbitrary Cypher queries (read, write, delete nodes) against NornicDB instances running with default setup. - Users following the README will reasonably assume
--address 127.0.0.1(the documented default) binds both protocols to localhost. - Workaround: host-firewall rules (e.g. macOS
pf) blocking non-loopback → 7687. Not discoverable from the docs.
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "github.com/orneryd/nornicdb"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.0.42-hotfix"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-1392"
],
"github_reviewed": true,
"github_reviewed_at": "2026-04-22T22:03:43Z",
"nvd_published_at": null,
"severity": "CRITICAL"
},
"details": "## Summary\n\nThe `--address` CLI flag (and `NORNICDB_ADDRESS` / `server.host` config key) is plumbed through to the HTTP server correctly but **never reaches the Bolt server config**. The Bolt listener therefore always binds to the wildcard address (all interfaces), regardless of what the user configures.\n\nOn a LAN, this exposes the graph database \u2014 with its default `admin:password` credentials \u2014 to any device sharing the network.\n\n## Version\n\n- `nornicdb v1.0.39`\n- Built from commit `afe7c9d` on `main`\n- Platform: macOS (darwin 25.4.0, arm64)\n\n## Reproduction\n\n```\n$ nornicdb serve --address 127.0.0.1 --bolt-port 7687 --http-port 7474 ...\n```\n\nOutput claims Bolt is on localhost:\n```\nBolt server listening on bolt://localhost:7687\n```\n\nBut the actual socket:\n```\n$ netstat -an -p tcp | grep 7687\ntcp46 0 0 *.7687 *.* LISTEN\n\n$ lsof -iTCP:7687 -sTCP:LISTEN -n -P\nnornicdb ... IPv6 ... TCP *:7687 (LISTEN)\n```\n\nHTTP port is correctly bound:\n```\ntcp4 127.0.0.1.7474 *.* LISTEN\n```\n\nReachable from another host on the LAN:\n```\n$ nc -z 192.168.x.y 7687\nConnection to 192.168.x.y port 7687 [tcp/*] succeeded!\n```\n\nSetting `NORNICDB_BOLT_ADDRESS=127.0.0.1` or `server.host: \"127.0.0.1\"` in `config.yaml` has **no effect** on the Bolt listener.\n\n## Root Cause\n\nIn `pkg/bolt/server.go:774-776`:\n\n```go\nfunc (s *Server) ListenAndServe() error {\n addr := fmt.Sprintf(\":%d\", s.config.Port)\n listener, err := net.Listen(\"tcp\", addr)\n ...\n}\n```\n\n`bolt.Config` (line 474) has no `Host`/`Address`/`Addr` field \u2014 only `Port`. The CLI flag `--address` is stored in a local variable in `cmd/nornicdb/main.go:80` and used to format user-facing log output (line 637\u2013644), but is never copied into `boltConfig` at line 600\u2013609 when Bolt is initialized.\n\nSince `ListenAndServe` calls `net.Listen(\"tcp\", \":7687\")` with an empty host, Go binds the wildcard socket on all interfaces.\n\n## Suggested Fix\n\n1. Add a `Host string` field to `bolt.Config` (default `\"127.0.0.1\"`, matching the CLI flag default).\n2. In `cmd/nornicdb/main.go` around line 601, wire it through:\n ```go\n boltConfig.Host = address\n boltConfig.Port = boltPort\n ```\n3. In `pkg/bolt/server.go:775`, use the host:\n ```go\n addr := net.JoinHostPort(s.config.Host, strconv.Itoa(s.config.Port))\n ```\n\n## Security Impact\n\n- Default `admin:password` credentials + wildcard binding = anyone on the same WiFi can issue arbitrary Cypher queries (read, write, delete nodes) against NornicDB instances running with default setup.\n- Users following the README will reasonably assume `--address 127.0.0.1` (the documented default) binds *both* protocols to localhost.\n- Workaround: host-firewall rules (e.g. macOS `pf`) blocking non-loopback \u2192 7687. Not discoverable from the docs.",
"id": "GHSA-2hp7-65r3-wv54",
"modified": "2026-04-22T22:03:43Z",
"published": "2026-04-22T22:03:43Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/orneryd/NornicDB/security/advisories/GHSA-2hp7-65r3-wv54"
},
{
"type": "WEB",
"url": "https://github.com/orneryd/NornicDB/commit/adce4f9a9fc7b6aada07c0bfa2d737cd7a6efaca"
},
{
"type": "PACKAGE",
"url": "https://github.com/orneryd/NornicDB"
},
{
"type": "WEB",
"url": "https://github.com/orneryd/NornicDB/releases/tag/v1.0.42-hotfix"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "NornicDB has Improper Network Binding in its Bolt Server, allowing unauthorized remote access"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.