Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-27928

Опубликовано: 19 мар. 2021
Источник: redhat
CVSS3: 7.2

Описание

A remote code execution issue was discovered in MariaDB 10.2 before 10.2.37, 10.3 before 10.3.28, 10.4 before 10.4.18, and 10.5 before 10.5.9; Percona Server through 2021-03-03; and the wsrep patch through 2021-03-03 for MySQL. An untrusted search path leads to eval injection, in which a database SUPER user can execute OS commands after modifying wsrep_provider and wsrep_notify_cmd. NOTE: this does not affect an Oracle product.

Меры по смягчению последствий

Only users that have the SUPER privilege can exploit this flaw. To reduce your exposure, ensure user accounts with the SUPER privilege are protected with strong credentials, only allowed to connect locally and not shared with untrusted parties.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6mysqlNot affected
Red Hat Enterprise Linux 7mariadbNot affected
Red Hat Enterprise Linux 8mariadb:10.5/mariadbNot affected
Red Hat Enterprise Linux 8mysql:8.0/mysqlNot affected
Red Hat Enterprise Linux 9mariadbNot affected
Red Hat Enterprise Linux 9mysqlNot affected
Red Hat Software Collectionsrh-mariadb105-mariadbNot affected
Red Hat Enterprise Linux 8mariadbFixedRHSA-2021:124219.04.2021
Red Hat Enterprise Linux 8mariadb-develFixedRHSA-2021:124219.04.2021
Red Hat Enterprise Linux 8.1 Extended Update SupportmariadbFixedRHSA-2021:124119.04.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-426->CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=1940909mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user

7.2 High

CVSS3

Связанные уязвимости

CVSS3: 7.2
ubuntu
больше 4 лет назад

A remote code execution issue was discovered in MariaDB 10.2 before 10.2.37, 10.3 before 10.3.28, 10.4 before 10.4.18, and 10.5 before 10.5.9; Percona Server through 2021-03-03; and the wsrep patch through 2021-03-03 for MySQL. An untrusted search path leads to eval injection, in which a database SUPER user can execute OS commands after modifying wsrep_provider and wsrep_notify_cmd. NOTE: this does not affect an Oracle product.

CVSS3: 7.2
nvd
больше 4 лет назад

A remote code execution issue was discovered in MariaDB 10.2 before 10.2.37, 10.3 before 10.3.28, 10.4 before 10.4.18, and 10.5 before 10.5.9; Percona Server through 2021-03-03; and the wsrep patch through 2021-03-03 for MySQL. An untrusted search path leads to eval injection, in which a database SUPER user can execute OS commands after modifying wsrep_provider and wsrep_notify_cmd. NOTE: this does not affect an Oracle product.

CVSS3: 7.2
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 7.2
debian
больше 4 лет назад

A remote code execution issue was discovered in MariaDB 10.2 before 10 ...

rocky
около 4 лет назад

Important: mariadb:10.3 and mariadb-devel:10.3 security update

7.2 High

CVSS3