The Oracle MySQL Connectors (Apr 2020 CPU) is vulnerable to multiple remote attack
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(135588);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/11/01");
script_cve_id("CVE-2020-2875", "CVE-2020-2933", "CVE-2020-2934");
script_xref(name:"IAVA", value:"2020-A-0143-S");
script_name(english:"Oracle MySQL Connectors (Apr 2020 CPU)");
script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by multiple vulnerabilities");
script_set_attribute(attribute:"description", value:
"The version of tested product installed on the remote host is prior to tested version. It is, therefore, affected by
the following vulnerabilities as referenced in the April 2020 CPU advisory:
- A vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported
versions that are affected are 8.0.14 and prior and 5.1.48 and prior. This is a difficult to exploit
vulnerability that allows an unauthenticated attacker, remote attacker via multiple protocols to
compromise MySQL Connectors. Successful attacks require human interaction from a person other than the
attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional
products. Successful attacks involving this vulnerability can result in unauthorized update, insert or
delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset
of MySQL Connectors accessible data. (CVE-2020-2875)
- A vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported
versions that are affected are 5.1.48 and prior. This is a difficult to exploit vulnerability that allows
a high privileged, remote attacker via multiple protocols to compromise MySQL Connectors. Successful
attacks involving this vulnerability can result in unauthorized ability to cause a partial denial of
service (partial DOS) of MySQL Connectors. (CVE-2020-2933)
- A vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported
versions that are affected are 8.0.19 and prior and 5.1.48 and prior. This is a difficult to exploit
vulnerability allows an unauthenticated, remote attacker via multiple protocols to compromise MySQL
Connectors. Successful attacks require human interaction from a person other than the attacker. Successful
attacks involving this vulnerability can result in unauthorized update, insert or delete access to some of
MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors
accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL
Connectors. (CVE-2020-2934)
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://www.oracle.com/security-alerts/cpuapr2020.html");
script_set_attribute(attribute:"solution", value:
"Apply the appropriate patch according to the April 2020 Oracle Critical Patch Update advisory.");
script_set_attribute(attribute:"agent", value:"all");
script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-2934");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2020/04/14");
script_set_attribute(attribute:"patch_publication_date", value:"2020/04/14");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/04/15");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:mysql_connectors");
script_set_attribute(attribute:"stig_severity", value:"I");
script_set_attribute(attribute:"thorough_tests", value:"true");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Misc.");
script_copyright(english:"This script is Copyright (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("mysql_connectors_version_nix.nbin", "mysql_connectors_version_win.nbin");
script_require_keys("installed_sw/MySQL Connector");
exit(0);
}
include('vcf.inc');
app_info = vcf::get_app_info(app:'MySQL Connector');
product = tolower(app_info['Product']);
vcf::check_granularity(app_info:app_info, sig_segments:3);
if ('java' >< product)
constraints = [
{'min_version': '5.1.0', 'fixed_version': '5.1.49'},
{'min_version': '8.0.0', 'fixed_version': '8.0.20'}
];
else
audit(AUDIT_PACKAGE_NOT_AFFECTED, product);
vcf::check_version_and_report(app_info: app_info, constraints: constraints, severity: SECURITY_WARNING);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo