Vulnerabilities > CVE-2019-2692 - Unspecified vulnerability in Oracle Mysql Connector/J

047910
CVSS 6.3 - MEDIUM
Attack vector
LOCAL
Attack complexity
HIGH
Privileges required
HIGH
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
local
high complexity
oracle
nessus

Summary

Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).

Vulnerable Configurations

Part Description Count
Application
Oracle
130

Nessus

NASL familyMisc.
NASL idORACLE_MYSQL_CONNECTORS_CPU_APR_2019.NASL
descriptionThe version of Oracle MySQL Connectors installed on the remote host is 8.0.x prior to 8.0.16 or 5.3.x prior to 5.3.13. It is, therefore, affected by multiple vulnerabilities as noted in the April 2019 Critical Patch Update advisory: - An unspecified vulnerability in Connector/J subcomponent. An authenticated attacker can exploit this issue, to take a full control over the target system. (CVE-2019-2692) - A padding oracle vulnerability exists in Connector/ODBC (OpenSSL) subcomponent. If the application is configured to use
last seen2020-04-18
modified2019-05-22
plugin id125340
published2019-05-22
reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/125340
titleOracle MySQL Connectors Multiple Vulnerabilities (Apr 2019 CPU)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(125340);
  script_version("1.4");
  script_set_attribute(attribute:"plugin_modification_date", value:"2020/04/17");

  script_cve_id("CVE-2019-2692", "CVE-2019-1559");
  script_bugtraq_id(107925, 107174);

  script_name(english:"Oracle MySQL Connectors Multiple Vulnerabilities (Apr 2019 CPU)");
  script_summary(english:"Checks installed patch/version info.");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of Oracle MySQL Connectors installed on the remote host is 8.0.x prior to 8.0.16 or 5.3.x prior to 5.3.13.
It is, therefore, affected by multiple vulnerabilities as noted in the April 2019 Critical Patch Update advisory:

  - An unspecified vulnerability in Connector/J subcomponent. An authenticated attacker can exploit this issue, to
    take a full control over the target system. (CVE-2019-2692)

  - A padding oracle vulnerability exists in Connector/ODBC (OpenSSL) subcomponent. If the application is configured 
    to use 'non-stitched' ciphersuits, a remote attacker can trigger a fatal protocol error condition. The vulnerable 
    application presents a padding related error messages which allow attacker to decrypt data. (CVE-2019-1559)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported 
version number.");
  # https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?9166970d");
  script_set_attribute(attribute:"solution", value:
"Apply the appropriate patches according to the April 2019 Oracle Critical Patch Update advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-1559");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/04/16");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/04/16");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/05/22");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:connector");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("mysql_connectors_version_nix.nbin", "mysql_connectors_version_win.nbin");
  script_require_keys("installed_sw/MySQL Connector");

  exit(0);
}

include('vcf.inc');

appname = 'MySQL Connector';

app_info = vcf::get_app_info(app:appname);
product = tolower(app_info['Product']);

vcf::check_granularity(app_info:app_info, sig_segments:3);

if ('odbc' >< product)
  constraints = [
    {'min_version': '5.3.0', 'fixed_version': '5.3.13'},
    {'min_version': '8.0.0', 'fixed_version': '8.0.16'}
  ];
else if ('java' >< product)
  constraints = [
    {'min_version': '8.0.0', 'fixed_version': '8.0.16'}
  ];
else
  audit(AUDIT_PACKAGE_NOT_AFFECTED, product);

vcf::check_version_and_report(app_info: app_info, constraints: constraints, severity: SECURITY_WARNING);