CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
AI Score
Confidence
High
EPSS
Percentile
78.1%
The version of tested product installed on the remote host is prior to tested version. It is, therefore, affected by the following vulnerabilities as referenced in the April 2020 CPU advisory:
A vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.14 and prior and 5.1.48 and prior. This is a difficult to exploit vulnerability that allows an unauthenticated attacker, remote attacker via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks involving this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data. (CVE-2020-2875)
A vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 5.1.48 and prior. This is a difficult to exploit vulnerability that allows a high privileged, remote attacker via multiple protocols to compromise MySQL Connectors. Successful attacks involving this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Connectors. (CVE-2020-2933)
A vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.19 and prior and 5.1.48 and prior. This is a difficult to exploit vulnerability allows an unauthenticated, remote attacker via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks involving this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Connectors. (CVE-2020-2934)
Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(135588);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/11/01");
script_cve_id("CVE-2020-2875", "CVE-2020-2933", "CVE-2020-2934");
script_xref(name:"IAVA", value:"2020-A-0143-S");
script_name(english:"Oracle MySQL Connectors (Apr 2020 CPU)");
script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by multiple vulnerabilities");
script_set_attribute(attribute:"description", value:
"The version of tested product installed on the remote host is prior to tested version. It is, therefore, affected by
the following vulnerabilities as referenced in the April 2020 CPU advisory:
- A vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported
versions that are affected are 8.0.14 and prior and 5.1.48 and prior. This is a difficult to exploit
vulnerability that allows an unauthenticated attacker, remote attacker via multiple protocols to
compromise MySQL Connectors. Successful attacks require human interaction from a person other than the
attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional
products. Successful attacks involving this vulnerability can result in unauthorized update, insert or
delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset
of MySQL Connectors accessible data. (CVE-2020-2875)
- A vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported
versions that are affected are 5.1.48 and prior. This is a difficult to exploit vulnerability that allows
a high privileged, remote attacker via multiple protocols to compromise MySQL Connectors. Successful
attacks involving this vulnerability can result in unauthorized ability to cause a partial denial of
service (partial DOS) of MySQL Connectors. (CVE-2020-2933)
- A vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported
versions that are affected are 8.0.19 and prior and 5.1.48 and prior. This is a difficult to exploit
vulnerability allows an unauthenticated, remote attacker via multiple protocols to compromise MySQL
Connectors. Successful attacks require human interaction from a person other than the attacker. Successful
attacks involving this vulnerability can result in unauthorized update, insert or delete access to some of
MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors
accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL
Connectors. (CVE-2020-2934)
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://www.oracle.com/security-alerts/cpuapr2020.html");
script_set_attribute(attribute:"solution", value:
"Apply the appropriate patch according to the April 2020 Oracle Critical Patch Update advisory.");
script_set_attribute(attribute:"agent", value:"all");
script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-2934");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2020/04/14");
script_set_attribute(attribute:"patch_publication_date", value:"2020/04/14");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/04/15");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:mysql_connectors");
script_set_attribute(attribute:"stig_severity", value:"I");
script_set_attribute(attribute:"thorough_tests", value:"true");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Misc.");
script_copyright(english:"This script is Copyright (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("mysql_connectors_version_nix.nbin", "mysql_connectors_version_win.nbin");
script_require_keys("installed_sw/MySQL Connector");
exit(0);
}
include('vcf.inc');
app_info = vcf::get_app_info(app:'MySQL Connector');
product = tolower(app_info['Product']);
vcf::check_granularity(app_info:app_info, sig_segments:3);
if ('java' >< product)
constraints = [
{'min_version': '5.1.0', 'fixed_version': '5.1.49'},
{'min_version': '8.0.0', 'fixed_version': '8.0.20'}
];
else
audit(AUDIT_PACKAGE_NOT_AFFECTED, product);
vcf::check_version_and_report(app_info: app_info, constraints: constraints, severity: SECURITY_WARNING);
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
AI Score
Confidence
High
EPSS
Percentile
78.1%