Lucene search

K
nessusThis script is Copyright (C) 2007-2018 and is owned by Tenable, Inc. or an Affiliate thereof.MYSQL_5_0_51.NASL
HistoryDec 10, 2007 - 12:00 a.m.

MySQL Community Server 5.0 < 5.0.51 RENAME TABLE Symlink System Table Overwrite

2007-12-1000:00:00
This script is Copyright (C) 2007-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
15

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:S/C:C/I:C/A:C

0.028 Low

EPSS

Percentile

90.7%

The version of MySQL Community Server installed on the remote host reportedly fails to check whether a file to which a symlink points exists when using RENAME TABLE against a table with explicit DATA DIRECTORY and INDEX DIRECTORY options. A local attacker may be able to leverage this issue to overwrite system table information by replacing the file to which the symlink points.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(29251);
  script_version("1.18");
  script_cvs_date("Date: 2018/11/15 20:50:21");

  script_cve_id("CVE-2007-5969");
  script_bugtraq_id(26765);

  script_name(english:"MySQL Community Server 5.0 < 5.0.51 RENAME TABLE Symlink System Table Overwrite");
  script_summary(english:"Checks version of MySQL Community Server");

  script_set_attribute(attribute:"synopsis", value:
"The remote database server is susceptible to a local symlink attack.");
  script_set_attribute(attribute:"description", value:
"The version of MySQL Community Server installed on the remote host
reportedly fails to check whether a file to which a symlink points
exists when using RENAME TABLE against a table with explicit DATA
DIRECTORY and INDEX DIRECTORY options.  A local attacker may be able
to leverage this issue to overwrite system table information by
replacing the file to which the symlink points.");
  script_set_attribute(attribute:"see_also", value:"http://dev.mysql.com/doc/refman/5.0/en/news-5-0-51.html");
  script_set_attribute(attribute:"see_also", value:"https://forums.mysql.com/read.php?3,186931,186931");
  script_set_attribute(attribute:"solution", value:
"Upgrade to MySQL Community Server version 5.0.51 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:S/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(264);

  script_set_attribute(attribute:"plugin_publication_date", value:"2007/12/10");

  script_set_attribute(attribute:"plugin_type", value: "remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:mysql:mysql");
  script_end_attributes();
 
  script_category(ACT_GATHER_INFO);
  script_family(english:"Databases");

  script_copyright(english:"This script is Copyright (C) 2007-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("mysql_version.nasl", "mysql_login.nasl");
  script_require_ports("Services/mysql", 3306);
  script_require_keys("Settings/ParanoidReport");

  exit(0);
}


include("global_settings.inc");
include("misc_func.inc");
include("mysql_func.inc");


# nb: banner checks of open source software are prone to false-
#     positives so only run the check if reporting is paranoid.
if (report_paranoia < 2)
  exit(1, "This plugin only runs if 'Report paranoia' is set to 'Paranoid'.");

port = get_service(svc:"mysql", default:3306, exit_on_fail:TRUE);

if (mysql_init(port:port, exit_on_fail:TRUE) == 1)
{
  variant = mysql_get_variant();
  ver = mysql_get_version();

  if ("Community" >< variant && ver =~ "^5\.0\.([0-9]|[1-4][0-9]|50)($|[^0-9])")
  {
    report = 'The remote MySQL Community Server\'s version is :\n\n  '+ver+'\n';
    datadir = get_kb_item('mysql/' + port + '/datadir');
    if (!empty_or_null(datadir))
    {
      report += '  Data Dir          : ' + datadir + '\n';
    }
    databases = get_kb_item('mysql/' + port + '/databases');
    if (!empty_or_null(databases))
    { 
      report += '  Databases         :\n' + databases;
    }
    security_hole(port:port, extra:report);
  }
}
mysql_close();
VendorProductVersionCPE
mysqlmysqlcpe:/a:mysql:mysql

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:S/C:C/I:C/A:C

0.028 Low

EPSS

Percentile

90.7%