The DBD::mysql module through 4.043 for Perl uses the mysql_ssl=1 setting to mean that SSL is optional (even though this setting's documentation has a "your communication with the server will be encrypted" statement), which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152.
References
Link | Resource |
---|---|
https://github.com/perl5-dbi/DBD-mysql/pull/114 | Third Party Advisory |
https://github.com/perl5-dbi/DBD-mysql/issues/110 | Third Party Advisory |
http://www.securityfocus.com/bid/99364 | Third Party Advisory VDB Entry |
https://github.com/perl5-dbi/DBD-mysql/issues/140 |
Configurations
Information
Published : 2017-07-01 11:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-10789
Mitre link : CVE-2017-10789
JSON object : View
CWE
Products Affected
dbd-mysql_project
- dbd-mysql