Lucene search

K
rubygemsRubySecRUBY:RUBY-MYSQL-2021-3779
HistoryJun 27, 2022 - 9:00 p.m.

ruby-mysql Client File Read

2022-06-2721:00:00
RubySec
www.rapid7.com
12
mysql
server
file read
authorization
ruby
client

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

A malicious MySQL server can request local file content from a client using ruby-mysql prior to version
2.10.0 without explicit authorization from the user. This issue was resolved in version 2.10.0 and
later.

Affected configurations

Vulners
Node
rubyruby-mysqlRange≤2.10.0
VendorProductVersionCPE
rubyruby-mysql*cpe:2.3:a:ruby:ruby-mysql:*:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N