vendor:
MySQL, MariaDB, PerconaDB
by:
Dawid Golunski
9,8
CVSS
CRITICAL
Privilege Escalation
264
CWE
Product Name: MySQL, MariaDB, PerconaDB
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: CVE-2016-6664, OCVE-2016-5617, CVE-2016-6663, OCVE-2016-5616, CVE-2016-6662
CPE: N/A
Metasploit:
https://www.rapid7.com/db/vulnerabilities/debian-cve-2016-6664/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2016-6664/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2016-6664/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2016-6664/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2016-6664/, https://www.rapid7.com/db/vulnerabilities/oracle-mysql-cve-2016-6664/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2016-6664/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2016-6664/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2016-6664/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2016-6664/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2016-6664/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2016-6663/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2016-6663/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2016-6663/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2016-6663/, https://www.rapid7.com/db/vulnerabilities/oracle-mysql-cve-2016-6663/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2016-6663/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2016-6663/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2016-6663/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2016-6663/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2016-6663/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2016-6663/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2016-6662/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2016-6662/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2016-6662/, https://www.rapid7.com/db/vulnerabilities/oracle-mysql-cve-2016-6662/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2016-6662/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2016-6662/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2016-6662/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2016-6662/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2016-6662/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2016-6662/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2016-6662/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2016-6662/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2016-6662/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2016
MySQL / MariaDB / PerconaDB – Root Privilege Escalation PoC Exploit
This PoC exploit allows attackers to (instantly) escalate their privileges from mysql system account to root through unsafe error log handling. The exploit requires that file-based logging has been configured (default). To confirm that syslog logging has not been enabled instead use: grep -r syslog /etc/mysql which should return no results.
Mitigation:
Ensure that syslog logging is enabled instead of file-based logging.