apoc.import

Security: Protecting against SSRF

These procedures can fetch data from external URLs and are susceptible to Server-Side Request Forgery (SSRF). To mitigate this:

  • Neo4j Enterprise Edition: Use Load Privileges with CIDR restrictions. Note: For admin users, you must also apply DENY EXECUTE BOOSTED PROCEDURE apoc.* ON DBMS TO PUBLIC to prevent boosted privileges from bypassing these restrictions.

  • Neo4j Community Edition: Configure the internal.dbms.cypher_ip_blocklist setting.

For detailed mitigation strategies, including examples on how to configure the internal.dbms.cypher_ip_blocklist setting, see the Knowledge Base article: Protecting against SSRF.

Qualified Name Type

apoc.import.csv(nodes LIST<MAP<STRING, ANY>>, rels LIST<MAP<STRING, ANY>>, config MAP<STRING, ANY>) - imports NODE and RELATIONSHIP values with the given labels and types from the provided CSV file.

Procedure

apoc.import.graphml(urlOrBinaryFile ANY, config MAP<STRING, ANY>) - imports a graph from the provided GraphML file.

Procedure

apoc.import.json(urlOrBinaryFile ANY, config MAP<STRING, ANY>) - imports a graph from the provided JSON file.

Procedure

apoc.import.xml(urlOrBinary ANY, config MAP<STRING, ANY>) - imports a graph from the provided XML file.

Procedure