Miggo Logo

CVE-2019-2692:
Privilege escalation in mysql-connector-jav

6.3

CVSS Score
3.0

Basic Information

EPSS Score
0.5706%
Published
7/1/2020
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
mysql:mysql-connector-javamaven< 8.0.168.0.16

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper access control in LOAD DATA LOCAL INFILE handling. Key evidence includes:

  1. Default value change of allowLoadLocalInfile in PropertyDefinitions.java
  2. Test cases showing explicit property setting requirement
  3. SQL execution methods (executeUpdate) being guarded by this property

The executeUpdate method is the direct entry point for command execution. getPropertySet provides the vulnerable default configuration, and character set handling functions could be involved in type confusion scenarios. The patch modifies default security controls around these code paths.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Vuln*r**ility in t** MySQL *onn**tors *ompon*nt o* Or**l* MySQL (su**ompon*nt: *onn**tor/J). Support** v*rsions t**t *r* *****t** *r* *.*.** *n* prior. *i**i*ult to *xploit vuln*r**ility *llows *i** privil**** *tt**k*r wit* lo*on to t** in*r*stru*tur

Reasoning

T** vuln*r**ility st*ms *rom improp*r ****ss *ontrol in LO** **T* LO**L IN*IL* **n*lin*. K*y *vi**n** in*lu**s: *. ****ult v*lu* ***n** o* *llowLo**Lo**lIn*il* in Prop*rty***initions.j*v* *. T*st **s*s s*owin* *xpli*it prop*rty s*ttin* r*quir*m*nt *.