CVE-2023-22102
This Vulnerability has been fixed in the Never-Ending Support (NES) version offered by HeroDevs.
Overview
MySQL Connectors is a product of Oracle MySQL that facilitates communication between applications and MySQL databases. It supports various programming languages and provides developers with the tools needed to connect and interact with MySQL databases effectively. The product is widely used in applications that require reliable database connectivity.
A vulnerability has been identified in MySQL Connectors, specifically affecting versions earlier than 8.2.0. This vulnerability allows an unauthenticated attacker with network access to compromise MySQL Connectors through multiple protocols. Although the exploitation of this vulnerability requires human interaction from a third party, successful attacks can lead to significant impacts on other products.
The potential consequences of this vulnerability include the takeover of MySQL Connectors, which poses a high security risk. The CVSS 3.1 Base Score for this vulnerability is 8.3, indicating serious concerns regarding confidentiality, integrity, and availability. The CVSS Vector reflects the conditions under which this vulnerability can be exploited.
According to CWE-284, this vulnerability falls under the category of "Improper Access Control." This means that the product does not adequately restrict access to its functionalities, allowing unauthorized users to perform actions that should be limited to authenticated users.
Details
Module Info
- Product: mysql-connector-j
- Affected packages:
mysql-connector-j - Affected versions: < 8.2.0
- GitHub repository: https://github.com/mysql/mysql-connector-j
- Published packages: https://central.sonatype.com/artifact/com.mysql/mysql-connector-j
- Package manager: Maven
- Fixed In: NES for mysql-connector-j 8.0.34
Vulnerability Info
CVE-2023-22102 is a vulnerability found in the MySQL Connectors product from Oracle MySQL, specifically in the Connector/J component. This issue affects supported versions up to 8.2.0 (exclusive). The vulnerability allows an unauthenticated attacker with network access to compromise MySQL Connectors through various protocols. Exploiting this vulnerability is challenging and requires human interaction from someone other than the attacker. Although the vulnerability is limited to MySQL Connectors, successful attacks can impact other related products. This change in scope means that the effects of an attack could be broader than initially expected. If exploited, the attacker could take control of MySQL Connectors, leading to significant security risks. The CVSS score for this vulnerability is 8.3, indicating high severity. Developers should prioritize addressing this issue to protect their systems. Regular updates and patches from Oracle should be applied to mitigate this risk.
Mitigation
- Set
autoDeserialize=falsein Connector/J configuration to prevent the vulnerable deserialization path. - Upgrade MySQL Connector/J to a fixed version newer than 8.2.0 (inclusive) when available.
- Limit network exposure to Connector/J usage paths to reduce attack surface.
Steps To Reproduce
- Use an application with MySQL Connector/J < 8.2.0 and
autoDeserialize=true(or default behavior if enabled). - Ensure the application is reachable over the network and that user interaction can occur.
- Provide crafted input that reaches Connector/J’s deserialization flow.
- Observe compromise of the Connector/J process, indicating takeover.