cve/2020/CVE-2020-14827.md

20 lines
1.5 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-14827](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14827)
![](https://img.shields.io/static/v1?label=Product&message=MySQL%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%205.7.31%20and%20prior%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20MySQL%20Server%20accessible%20data.&color=brighgreen)
### Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
### POC
#### Reference
- https://www.oracle.com/security-alerts/cpuoct2020.html
2024-06-09 00:33:16 +00:00
- https://www.oracle.com/security-alerts/cpuoct2020.html
2024-05-25 21:48:12 +02:00
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/lukaspustina/cve-scorer