Arbitrary Code Execution Affecting mysql:mysql-connector-java package, versions [,5.1.42)


0.0
medium

Snyk CVSS

    Attack Complexity Low
    Scope Changed

    Threat Intelligence

    EPSS 0.12% (45th percentile)
Expand this section
NVD
6.4 medium
Expand this section
Red Hat
6.4 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-MYSQL-31580
  • published 9 Nov 2017
  • disclosed 23 Apr 2017
  • credit Unknown

How to fix?

Upgrade mysql:mysql-connector-java to version 5.1.42 or higher.

Overview

mysql:mysql-connector-java provides connectivity for client applications developed in the Java programming language with MySQL Connector/J, a driver that implements the Java Database Connectivity (JDBC) API.

Affected versions of the package are vulnerable to Arbitrary Code Execution. Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.41 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. While the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data.