René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

81 lines
3.8 KiB
JSON

{
"id": "CVE-2022-21555",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2022-07-19T22:15:12.463",
"lastModified": "2022-07-25T18:58:53.463",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the MySQL Shell for VS Code product of Oracle MySQL (component: Shell: GUI). Supported versions that are affected are 1.1.8 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Shell for VS Code executes to compromise MySQL Shell for VS Code. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Shell for VS Code, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Shell for VS Code accessible data as well as unauthorized read access to a subset of MySQL Shell for VS Code accessible data. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N)."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el producto MySQL Shell for VS Code de Oracle MySQL (componente: Shell: GUI). Las versiones compatibles que est\u00e1n afectadas son 1.1.8 y anteriores. Una vulnerabilidad explotable f\u00e1cilmente permite a un atacante muy privilegiado y con acceso a la infraestructura donde es ejecutado MySQL Shell for VS Code comprometer MySQL Shell for VS Code. Los ataques con \u00e9xito requieren una interacci\u00f3n humana de una persona diferente del atacante y mientras la vulnerabilidad est\u00e1 en MySQL Shell para VS Code, los ataques pueden impactar significativamente en productos adicionales (cambio de alcance). Los ataques con \u00e9xito de esta vulnerabilidad pueden resultar en el acceso no autorizado de actualizaci\u00f3n, inserci\u00f3n o eliminaci\u00f3n de algunos de los datos accesibles de MySQL Shell para VS Code, as\u00ed como el acceso no autorizado de lectura a un subconjunto de datos accesibles de MySQL Shell para VS Code. CVSS 3.1, Puntuaci\u00f3n Base 4.2 (impactos en la Confidencialidad y la Integridad). Vector CVSS: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_shell:*:*:*:*:*:visual_studio_code:*:*",
"versionEndIncluding": "1.1.8",
"matchCriteriaId": "38BF6087-B921-44FB-A3F9-B49911A874E4"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujul2022.html",
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}