MySQL vulnerabilities allow malicious servers to steal data from customers
A design-related vulnerability in file transfer interaction between the client and MySQL server allowed an attacker to run a malicious MySQL server to gain access to any data that the client is connected to. being allowed access.
Someone can take advantage of this problem to steal sensitive data from an improperly configured web server, allowing connection to untrusted servers or from database management applications. material.
The problem with the LOAD DATA command used with the LOCAL modification tool, is considered a security risk in the MySQL document.
Developers specifically explain this issue as follows, customers receive requests to transfer files from MySQL servers based on the information they provide in the LOAD DATA statement.However, a malicious server can respond with the LOAD DATA LOCAL command and ask for any files that the client has read and access rights.
- 773 million emails, 21 million passwords were revealed on the Internet, this is the largest personal data leak in history
The MySQL document states: 'In fact, a patched server can respond to requests to transfer files to any command, not just LOAD DATA LOCAL, so the more fundamental problem is Customers should not connect to untrusted servers'.
The same thing can be applied to web servers - which act as clients when connecting to MySQL servers.In this case, the attacker could use the vulnerability to steal / etc / passwd files, which is where the user account records are kept.
Files can only be retrieved this way if the server knows their full path.However, in fact, malicious servers can also request the file / proc / self / environ, this is the file that provides the environment variable of the running processes, so it will also display main directory information as well as details about internal subfolder structure.
Phishing MySQL servers are always ready to attack you
In a discussion on Reddit initiated by security researcher Willem de Groot yesterday, discuss possible situations for a malicious MySQL server to attack user data.Stealing SSH keys and access information to e-wallet are the top common behaviors in the list.According to de Groot, Magecart attacks in October 2018 took advantage of the MySQL vulnerability to inject malicious code into shopping sites to steal credit card and bank account details when users advanced. online payment operator.
- Microsoft shook hands with VirusTotal in resolving malicious code issues that affected MSI files
The malicious code for a phishing MySQL server has been available on GitHub for the past five years, so it should not be surprising if cyber criminals use it in their attacks.The purpose of the attackers seems to be to steal a file ('local.xml') in which the Magento trading platform stores its database passwords.This may occur on sites running vulnerable versions of Adminer (versions 4.3.1 to 4.6.2 are found to be affected by the above security error).Therefore, system administrators should switch to safer versions, at least 4.6.3.
See more:
- The Internet is experiencing a huge problem with C / C ++, causing developers to "sweat"
- Hacker purged two-factor security just by automated phishing attacks
- Quora's question and answer page was attacked, causing 100 million users to leak personal information
- Vulnerabilities in Android allow malware to read device information even without permission
You should read it
- How to Connect to MySQL Using PHP
- How to Send Sql Queries to Mysql from the Command Line
- Malware stored in Google Sites sends data to the MySQL server
- How to install MySQL on Ubuntu 20.04
- Instructions for installing MySQL on Windows and remote access
- Instructions on how to connect to MySQL Database in Eclipse
- How to create a database in MySQL
- How to Check Database Size in MySQL
May be interested
- Critical error on Apache Struts2 allows hackers to take over the web servernew researchers have discovered a remote code execution flaw in the apache struts open source web application framework, allowing an attacker to run malicious code on the server.
- Steps to Import data from different tables in MySQL Workbenchinstructions on how to export and import data from different tables in a mysql database through the mysql workbench tool
- How to Send Sql Queries to Mysql from the Command Linea simple text-based program called mysql should have been part of your mysql installation. it lets you send sql queries directly to the mysql server and output the results in text format. it is a quick and easy way to test your mysql...
- Counter-Strike 1.6 features new Zero-Day, allowing malicious servers to hack gamers' computersif you're a counter-strike player, be careful.
- Instructions on how to connect to MySQL Database in Eclipseinstructions for connecting to mysql database in eclipse, helping you to connect to the mysql server database to manipulate data directly on the ide instead of using the mysql workbench tool
- Warning: Dangerous new malicious code spills over to Vietnamon the afternoon of february 14, bkav's virus surveillance system issued a warning about a w32.weakpass extortion encryption code-targeting campaign targeting vietnamese public servers of foreign hackers.
- How to install MySQL on Ubuntu 20.04in this article, tipsmake will show how to install mysql version 8.0 on ubuntu 20.04 server. by completing it, you'll have an active relational database that can be used to build your next website or app.
- How to Connect to MySQL Using PHPif you already know some of the basics of writing php scripts, you may be ready to learn about a set of built-in php functions that allow you to connect to and manipulate a mysql database. if you do not already have a mysql server (most...
- SaltStack has the most serious vulnerability ever, thousands of servers can be seriously affectedunlike previous vulnerabilities, this one of saltstack can affect all servers in the system, causing a much bigger impact.
- New dangerous vulnerability in Intel CPU: Works like Specter and Meltdown, threatening all PCs and the cloudan extremely serious new class of intel chip vulnerabilities has been discovered by security researchers at graz university of technology, if successful exploitation of the bad guys can take advantage of it to steal sensitive information online. next from the processor.