Lucene search

K
nessusThis script is Copyright (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.ORACLE_MYSQL_CONNECTORS_CPU_APR_2020.NASL
HistoryApr 15, 2020 - 12:00 a.m.

Oracle MySQL Connectors (Apr 2020 CPU)

2020-04-1500:00:00
This script is Copyright (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
17

4.8 Medium

AI Score

Confidence

High

The version of tested product installed on the remote host is prior to tested version. It is, therefore, affected by the following vulnerabilities as referenced in the April 2020 CPU advisory:

  • A vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.14 and prior and 5.1.48 and prior. This is a difficult to exploit vulnerability that allows an unauthenticated attacker, remote attacker via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks involving this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data. (CVE-2020-2875)

  • A vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 5.1.48 and prior. This is a difficult to exploit vulnerability that allows a high privileged, remote attacker via multiple protocols to compromise MySQL Connectors. Successful attacks involving this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Connectors. (CVE-2020-2933)

  • A vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.19 and prior and 5.1.48 and prior. This is a difficult to exploit vulnerability allows an unauthenticated, remote attacker via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks involving this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Connectors. (CVE-2020-2934)

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(135588);
  script_version("1.6");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/11/01");

  script_cve_id("CVE-2020-2875", "CVE-2020-2933", "CVE-2020-2934");
  script_xref(name:"IAVA", value:"2020-A-0143-S");

  script_name(english:"Oracle MySQL Connectors (Apr 2020 CPU)");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by multiple vulnerabilities");
  script_set_attribute(attribute:"description", value:
"The version of tested product installed on the remote host is prior to tested version. It is, therefore, affected by
the following vulnerabilities as referenced in the April 2020 CPU advisory:

  - A vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported
    versions that are affected are 8.0.14 and prior and 5.1.48 and prior. This is a difficult to exploit
    vulnerability that allows an unauthenticated attacker, remote attacker via multiple protocols to
    compromise MySQL Connectors. Successful attacks require human interaction from a person other than the
    attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional
    products. Successful attacks involving this vulnerability can result in unauthorized update, insert or
    delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset
    of MySQL Connectors accessible data. (CVE-2020-2875) 

  - A vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported
    versions that are affected are 5.1.48 and prior. This is a difficult to exploit vulnerability that allows
    a high privileged, remote attacker via multiple protocols to compromise MySQL Connectors. Successful
    attacks involving this vulnerability can result in unauthorized ability to cause a partial denial of
    service (partial DOS) of MySQL Connectors. (CVE-2020-2933)

  - A vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported
    versions that are affected are 8.0.19 and prior and 5.1.48 and prior. This is a difficult to exploit
    vulnerability allows an unauthenticated, remote attacker via multiple protocols to compromise MySQL
    Connectors. Successful attacks require human interaction from a person other than the attacker. Successful
    attacks involving this vulnerability can result in unauthorized update, insert or delete access to some of
    MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors
    accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL
    Connectors. (CVE-2020-2934)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  script_set_attribute(attribute:"see_also", value:"https://www.oracle.com/security-alerts/cpuapr2020.html");
  script_set_attribute(attribute:"solution", value:
"Apply the appropriate patch according to the April 2020 Oracle Critical Patch Update advisory.");
  script_set_attribute(attribute:"agent", value:"all");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-2934");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2020/04/14");
  script_set_attribute(attribute:"patch_publication_date", value:"2020/04/14");
  script_set_attribute(attribute:"plugin_publication_date", value:"2020/04/15");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:mysql_connectors");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("mysql_connectors_version_nix.nbin", "mysql_connectors_version_win.nbin");
  script_require_keys("installed_sw/MySQL Connector");

  exit(0);
}
include('vcf.inc');

app_info = vcf::get_app_info(app:'MySQL Connector');
product = tolower(app_info['Product']);

vcf::check_granularity(app_info:app_info, sig_segments:3);

if ('java' >< product)
  constraints = [
    {'min_version': '5.1.0', 'fixed_version': '5.1.49'},
    {'min_version': '8.0.0', 'fixed_version': '8.0.20'}
  ];
else
  audit(AUDIT_PACKAGE_NOT_AFFECTED, product);

vcf::check_version_and_report(app_info: app_info, constraints: constraints, severity: SECURITY_WARNING);
VendorProductVersionCPE
oraclemysql_connectorscpe:/a:oracle:mysql_connectors