-
CVSS Score
-A Semantic Attack on Google Gemini - Read the Latest Research
The vulnerability stems from automatic deserialization of binary data in ResultSet handling. The key function is getNativeConvertToString which contained unprotected ObjectInputStream usage. The patch adds a configuration check (getAutoDeserialize) around the deserialization block, indicating this was the vulnerable code path. This function would appear in stack traces when processing malicious serialized objects from result sets.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| mysql:mysql-connector-java | maven | <= 5.1.41 | 5.1.42 |