cve/2023/CVE-2023-21882.md

18 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-21882](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21882)
![](https://img.shields.io/static/v1?label=Product&message=MySQL%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%208.0.31%20and%20prior%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.&color=brighgreen)
### Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).
### POC
#### Reference
- https://www.oracle.com/security-alerts/cpujan2023.html
#### Github
No PoCs found on GitHub currently.