Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2012-5613
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
MySQL 5.5.19 and possibly other versions, and MariaDB 5.5.28a and possibly other versions, when configured to assign the FILE privilege to users who should not have administrative privileges, allows remote authenticated users to gain privileges by leveraging the FILE privilege to create files as the MySQL administrator. NOTE: the vendor disputes this issue, stating that this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. NOTE: it could be argued that this should not be included in CVE because it is a configuration issue..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 6/10
- Exploit Score
- 6.8/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- Single
- Impact Score
- 6.4/10
- Confidentiality Impact
- Partial
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:mariadb:mariadb:5.5.28a:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:linux:linux:*:*:*:*:*:*:*:* |
No
|
- |
References
- http://www.openwall.com/lists/oss-security/2012/12/02/3
- http://seclists.org/fulldisclosure/2012/Dec/6
- http://www.openwall.com/lists/oss-security/2012/12/02/4
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00000.html
- http://security.gentoo.org/glsa/glsa-201308-06.xml
- http://secunia.com/advisories/53372