vendor:
MySQL
by:
Kingcope
9,8
CVSS
HIGH
Remote Code Execution
264
CWE
Product Name: MySQL
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2020
Oracle MySQL on Windows Remote SYSTEM Level Exploit zeroday
This exploit is a post-auth, udf technique which allows attackers to gain SYSTEM level access to a Windows machine running Oracle MySQL. It requires a valid database admin user and his password for the exploit to work properly. The exploit is mirrored at the farlight website http://www.farlight.org and includes a mass scanner. Installation instructions are provided in the text.
Mitigation:
Install the latest version of Oracle MySQL and ensure that the firewall is open on the desired reverse port on the attacking machine.