MySQL Server COM_CHANGE_USER Command Security Bypass

medium Nessus Plugin ID 71116

Synopsis

The remote database server may be affected by a security bypass vulnerability.

Description

The installed version of MySQL may be affected by a security bypass vulnerability because the salt used during password validation does not change when switching users with the 'COM_CHANGE_USER' command.
Additionally, the connection is not reset when invalid credentials are submitted. Normally, when a connection is initiated and invalid credentials are submitted, the connection is terminated, which slows brute-force attempts substantially.

Solution

There is no solution at this time.

See Also

https://seclists.org/fulldisclosure/2012/Dec/58

Plugin Details

Severity: Medium

ID: 71116

File Name: mysql_com_change_user_bruteforce_weakness.nasl

Version: 1.7

Type: remote

Family: Databases

Published: 11/27/2013

Updated: 2/24/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.2

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS Score Source: CVE-2012-5627

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Vulnerability Information

CPE: cpe:/a:mysql:mysql, cpe:/a:oracle:mysql

Required KB Items: Settings/PCI_DSS

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Vulnerability Publication Date: 12/3/2012

Reference Information

CVE: CVE-2012-5627

BID: 56837