SB2021072059 - Multiple vulnerabilities in MySQL Cluster



SB2021072059 - Multiple vulnerabilities in MySQL Cluster

Published: July 20, 2021

Security Bulletin ID SB2021072059
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Improper input validation (CVE-ID: CVE-2021-2411)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the Cluster: JS module component in MySQL Cluster. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.


2) DNS rebinding (CVE-ID: CVE-2021-22884)

The vulnerability allows a remote attacker to perform DNS rebinding attack.

The vulnerability exists due to the application whitelist includes the “localhost6” name. When “localhost6” is not present in /etc/hosts, it is treated an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain.


Remediation

Install update from vendor's website.