6
CVSSv2

CVE-2012-5613

Published: 03/12/2012 Updated: 11/04/2024
CVSS v2 Base Score: 6 | Impact Score: 6.4 | Exploitability Score: 6.8
VMScore: 615
Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Summary

MySQL 5.5.19 and possibly other versions, and MariaDB 5.5.28a and possibly other versions, when configured to assign the FILE privilege to users who should not have administrative privileges, allows remote authenticated users to gain privileges by leveraging the FILE privilege to create files as the MySQL administrator. NOTE: the vendor disputes this issue, stating that this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. NOTE: it could be argued that this should not be included in CVE because it is a configuration issue.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mariadb mariadb 5.5.28a

oracle mysql 5.5.19

Vendor Advisories

Debian Bug report logs - #695001 mysql-55: New MySQL issues Package: mysql-55; Maintainer for mysql-55 is Debian MySQL Maintainers <pkg-mysql-maint@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Mon, 3 Dec 2012 07:54:02 UTC Severity: grave Tags: security Fixed in version mysql-5 ...

Exploits

## # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::MYSQL include Msf::Exploit::EXE include Msf::Exploit::FileDropper def initialize(info = {}) super(update_info(info, 'Name' => ...
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # web site for more information on licensing and terms of use # metasploitcom/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit ...
use DBI(); $|=1; =for comment MySQL privilege elevation Exploit This exploit adds a new admin user By Kingcope Tested on * Debian Lenny (mysql-5051a) * OpenSuSE 114 (5153-log) How it works: This exploit makes use of several things: *The attacker is in possession of a mysql user with 'file' privileges for the target *So the attacker can ...

Github Repositories

MySQL-Fu is a Ruby based MySQL Client Script I wrote. It does most of the stuff a normal MySQL client might do: SQL Shell, Update/Delete/Drop Database/Table, Add/Delete Users, Dump Database(s)/Table w/ option for gzip...... Plus a few extra options to make life a little easier for pentests. Includes Several builtin PHP Command Shell options as w…

MySQL-Furb MySQL-Fu is a Ruby based MySQL Client Script I wrote It does most of the stuff a normal MySQL client might do: SQL Shell, Update/Delete/Drop Database/Table, Add/Delete Users, Dump Database(s)/Table w/ option for gzip Plus a few extra options to make life a little easier for pentests Includes Several builtin PHP Command Shell options as well as Pentestmonkey

Recent Articles

MySQL gains new batch of vulns
The Register • Richard Chirgwin • 04 Dec 2012

Overruns, privileges, DoS and more

A series of posts on ExploitDB by an author signing as “King Cope” reveal a new set of MySQL vulnerabilities – along with one issue that could just be a configuration issue. The vulnerabilities, which emerged on Saturday, include a denial-of-service demonstration, a Windows remote root attack, two overrun attacks that work on Linux, and one privilege escalation attack, also on Linux. The overflow bugs crash the MySQL daemon, allowing the attacker to then execute commands with the same priv...