Improper access control in MySQL Connectors - CVE-2017-3586

 

Improper access control in MySQL Connectors - CVE-2017-3586

Published: April 12, 2018


Vulnerability identifier: #VU11785
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-3586
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Oracle
Affected software:
MySQL Connectors

Detailed vulnerability description

The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information and write arbitrary files on the target system.

The weakness exists due to improper access control. A remote attacker can gain unauthorized update, insert or delete access to some of MySQL Connectors accessible data and unauthorized read access to a subset of MySQL Connectors accessible data.

How to mitigate CVE-2017-3586

Install update from vendor's website.

Sources