An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS03M3ByLWc2amotNWhjOc4AAtBO

Externally Controlled Reference to a Resource in Another Sphere in ruby-mysql

A malicious actor can read arbitrary files from a client that uses ruby-mysql to communicate to a rogue MySQL server and issue database queries. In these cases, the server has the option to create a database reply using the LOAD DATA LOCAL statement, which instructs the client to provide additional data from a local file readable by the client (and not a "local" file on the server).

Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: over 1 year ago

CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Identifiers: GHSA-73pr-g6jj-5hc9, CVE-2021-3779
References: Blast Radius: 15.8

Affected Packages

Dependent packages: 17
Dependent repositories: 267
Downloads: 5,477,948 total
Affected Version Ranges: < 2.10.0
Fixed in: 2.10.0
All affected versions: 2.9.0, 2.9.1, 2.9.2, 2.9.3, 2.9.4, 2.9.5, 2.9.6, 2.9.7, 2.9.8, 2.9.9, 2.9.10, 2.9.11, 2.9.12, 2.9.13, 2.9.14
All unaffected versions: 2.10.0, 2.11.0, 2.11.1, 3.0.0, 3.0.1, 4.0.0, 4.1.0