CVE-2022-21290Creation of Temporary File in Directory with Insecure Permissions in Oracle Mysql

Severity
6.3MEDIUMNVD
GHSA5.5
EPSS
11.4%
top 6.39%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 19
Latest updateMay 10

Description

Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover

CVSS vector

CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:HExploitability: 0.4 | Impact: 5.9

Affected Packages2 packages

CVEListV5oracle_corporation/mysql_cluster8.0.27 and prior
NVDoracle/mysql8.0.08.0.27

🔴Vulnerability Details

3
GHSA
Local Information Disclosure Vulnerability in io.netty:netty-codec-http2022-05-10
GHSA
GHSA-g95j-qpmf-f2fq: Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General)2022-01-20
CVEList
CVE-2022-21290: Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General)2022-01-19

📋Vendor Advisories

3
Red Hat
netty: world readable temporary file containing sensitive data2022-05-06
Oracle
Oracle Oracle MySQL Risk Matrix: Cluster: General — CVE-2022-212902022-01-15
Microsoft
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high priv2022-01-11