Vulnerabilities > CVE-2012-5613 - Configuration vulnerability in multiple products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
mariadb
oracle
CWE-16
nessus
exploit available
metasploit

Summary

MySQL 5.5.19 and possibly other versions, and MariaDB 5.5.28a and possibly other versions, when configured to assign the FILE privilege to users who should not have administrative privileges, allows remote authenticated users to gain privileges by leveraging the FILE privilege to create files as the MySQL administrator. NOTE: the vendor disputes this issue, stating that this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. NOTE: it could be argued that this should not be included in CVE because it is a configuration issue.

Vulnerable Configurations

Part Description Count
Application
Mariadb
1
Application
Oracle
1
OS
Linux
1

Common Weakness Enumeration (CWE)

Exploit-Db

  • descriptionMySQL (Linux) - Database Privilege Elevation Exploit (0day). CVE-2012-5613. Local exploit for linux platform
    idEDB-ID:23077
    last seen2016-02-02
    modified2012-12-02
    published2012-12-02
    reporterkingcope
    sourcehttps://www.exploit-db.com/download/23077/
    titleMySQL Linux - Database Privilege Elevation Exploit 0day
  • descriptionOracle MySQL for Microsoft Windows FILE Privilege Abuse. CVE-2012-5613. Remote exploit for windows platform
    idEDB-ID:35777
    last seen2016-02-04
    modified2015-01-13
    published2015-01-13
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/35777/
    titleOracle MySQL for Microsoft Windows - FILE Privilege Abuse
  • descriptionOracle MySQL for Microsoft Windows MOF Execution. CVE-2012-5613. Remote exploit for windows platform
    idEDB-ID:23179
    last seen2016-02-02
    modified2012-12-06
    published2012-12-06
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/23179/
    titleOracle MySQL for Microsoft Windows MOF Execution

Metasploit

Nessus

  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201308-06.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201308-06 (MySQL: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in MySQL. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could send a specially crafted request, possibly resulting in execution of arbitrary code with the privileges of the application or a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id69508
    published2013-08-30
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/69508
    titleGLSA-201308-06 : MySQL: Multiple vulnerabilities
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-1807-1.NASL
    descriptionMultiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.1.69 in Ubuntu 10.04 LTS and Ubuntu 11.10. Ubuntu 12.04 LTS and Ubuntu 12.10 have been updated to MySQL 5.5.31. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-69.html http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-31.html http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.h tml. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id66215
    published2013-04-25
    reporterUbuntu Security Notice (C) 2013-2019 Canonical, Inc. / NASL script (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/66215
    titleUbuntu 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : mysql-5.1, mysql-5.5, mysql-dfsg-5.1 vulnerabilities (USN-1807-1)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_LIBMYSQLCLIENT-DEVEL-121227.NASL
    descriptionA stack-based buffer overflow in MySQL has been fixed that could have caused a Denial of Service or potentially allowed the execution of arbitrary code. (CVE-2012-5611)
    last seen2020-06-05
    modified2013-02-10
    plugin id64531
    published2013-02-10
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/64531
    titleSuSE 11.2 Security Update : MySQL (SAT Patch Number 7251)

Packetstorm

Saint

bid56771
descriptionMySQL FILE privilege elevation
iddatabase_mysql_version
osvdb88118
titlemysql_file
typeremote