-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| ruby-mysql | rubygems | < 2.10.0 | 2.10.0 |
The vulnerability existed in how the client handled LOAD DATA LOCAL INFILE requests. The Protocol#get_result method directly processed server-specified filenames without validation in vulnerable versions. The patch moves this logic to send_local_file with path checks, indicating the original get_result implementation was vulnerable. Protocol#initialize's modification to track local_infile shows it was part of the insecure initialization chain that allowed unrestricted file access when client flags were set.
Ongoing coverage of React2Shell