Vulnerabilities > CVE-2019-2692 - Unspecified vulnerability in Oracle Mysql Connector/J
Summary
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
Vulnerable Configurations
Nessus
NASL family | Misc. |
NASL id | ORACLE_MYSQL_CONNECTORS_CPU_APR_2019.NASL |
description | The version of Oracle MySQL Connectors installed on the remote host is 8.0.x prior to 8.0.16 or 5.3.x prior to 5.3.13. It is, therefore, affected by multiple vulnerabilities as noted in the April 2019 Critical Patch Update advisory: - An unspecified vulnerability in Connector/J subcomponent. An authenticated attacker can exploit this issue, to take a full control over the target system. (CVE-2019-2692) - A padding oracle vulnerability exists in Connector/ODBC (OpenSSL) subcomponent. If the application is configured to use |
last seen | 2020-04-18 |
modified | 2019-05-22 |
plugin id | 125340 |
published | 2019-05-22 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/125340 |
title | Oracle MySQL Connectors Multiple Vulnerabilities (Apr 2019 CPU) |
code |
|
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- http://www.securityfocus.com/bid/107925
- http://www.securityfocus.com/bid/107925
- https://security.netapp.com/advisory/ntap-20190423-0002/
- https://security.netapp.com/advisory/ntap-20190423-0002/