Vulnerability Details : CVE-2017-10789
The DBD::mysql module through 4.043 for Perl uses the mysql_ssl=1 setting to mean that SSL is optional (even though this setting's documentation has a "your communication with the server will be encrypted" statement), which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152.
Products affected by CVE-2017-10789
- cpe:2.3:a:dbd-mysql_project:dbd-mysql:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-10789
0.39%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 57 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-10789
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST | |
5.9
|
MEDIUM | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |
2.2
|
3.6
|
NIST |
References for CVE-2017-10789
-
https://github.com/perl5-dbi/DBD-mysql/issues/110
Handle SSL/TLS correctly · Issue #110 · perl5-dbi/DBD-mysql · GitHubThird Party Advisory
-
https://github.com/perl5-dbi/DBD-mysql/issues/140
CVE-2017-10789: mysql_ssl=1 does not enforce encryption · Issue #140 · perl5-dbi/DBD-mysql · GitHub
-
http://www.securityfocus.com/bid/99364
Perl DBD::mysql Module CVE-2017-10789 Man in the Middle Security Bypass VulnerabilityThird Party Advisory;VDB Entry
-
https://github.com/perl5-dbi/DBD-mysql/pull/114
Improve SSL settings, reflect changes for BACKRONYM and Riddle vulnerabilities, enforce SSL encryption when mysql_ssl=1 is set by pali · Pull Request #114 · perl5-dbi/DBD-mysql · GitHubThird Party Advisory
Jump to