ebubeaso / IT-coding-work

This repository has various coding scripts in Python, Ruby and Bash that I have worked on to better practice my programming skills for IT.
0 stars 0 forks source link

CVE-2024-21170 (Medium) detected in mysql_connector_python-8.0.21-cp37-cp37m-manylinux1_x86_64.whl #268

Open mend-bolt-for-github[bot] opened 3 months ago

mend-bolt-for-github[bot] commented 3 months ago

CVE-2024-21170 - Medium Severity Vulnerability

Vulnerable Library - mysql_connector_python-8.0.21-cp37-cp37m-manylinux1_x86_64.whl

MySQL driver written in Python

Library home page: https://files.pythonhosted.org/packages/6a/14/f09a56884082b6ede45cd33a8c5d42d2bcb758832bb05bd5940f2e39fe04/mysql_connector_python-8.0.21-cp37-cp37m-manylinux1_x86_64.whl

Path to dependency file: /ReactPython1/ReactPython1/PythonBackendPractice/test1/requirements.txt

Path to vulnerable library: /ReactPython1/ReactPython1/PythonBackendPractice/test1/requirements.txt

Dependency Hierarchy: - :x: **mysql_connector_python-8.0.21-cp37-cp37m-manylinux1_x86_64.whl** (Vulnerable Library)

Found in HEAD commit: 6d107a6688bc22c52eeb62e12abbb00206f7105f

Found in base branch: master

Vulnerability Details

Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 8.4.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Connectors. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).

Publish Date: 2024-07-16

URL: CVE-2024-21170

CVSS 3 Score Details (6.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low

For more information on CVSS3 Scores, click here.


Step up your Open Source Security Game with Mend here