Arbitrary Code Execution Affecting mysql:mysql-connector-java package, versions [,5.1.42)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.49% (76th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Execution vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-MYSQL-31580
  • published9 Nov 2017
  • disclosed23 Apr 2017
  • creditUnknown

Introduced: 23 Apr 2017

CVE-2017-3586  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade mysql:mysql-connector-java to version 5.1.42 or higher.

Overview

mysql:mysql-connector-java provides connectivity for client applications developed in the Java programming language with MySQL Connector/J, a driver that implements the Java Database Connectivity (JDBC) API.

Affected versions of the package are vulnerable to Arbitrary Code Execution. Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.41 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. While the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data.

CVSS Scores

version 3.1