Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2023-22102 (High) detected in mysql-connector-j-8.0.33.jar - autoclosed #3920

Closed
mend-for-github-com bot opened this issue Jan 5, 2024 · 3 comments
Assignees
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource
Milestone

Comments

@mend-for-github-com
Copy link
Contributor

mend-for-github-com bot commented Jan 5, 2024

CVE-2023-22102 - High Severity Vulnerability

Vulnerable Library - mysql-connector-j-8.0.33.jar

JDBC Type 4 driver for MySQL.

Library home page: http://dev.mysql.com/doc/connector-j/en/

Dependency Hierarchy:

Found in HEAD commit: 90bdaa7e7833bdd504c817e49d4434b4d8880f56

Found in base branch: main

Vulnerability Details

Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.1.0 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).

Publish Date: 2023-10-17

URL: CVE-2023-22102

CVSS 3 Score Details (8.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2023-22102

Release Date: 2023-10-17

Fix Resolution: com.mysql:mysql-connector-j:8.2.0

@dlvenable
Copy link
Member

@wanghd89, @dinujoh , Please take note that there is a vulnerability in the new Kafka Connect plugins project. It hasn't been released yet, but we should resolve this before we make it available.

@dlvenable dlvenable added this to the v2.8 milestone Jan 17, 2024
@dlvenable dlvenable assigned dlvenable and unassigned dinujoh Feb 15, 2024
@dlvenable
Copy link
Member

This should be resolved by the remove of the Kafka Connect plugins project as completed in #4090.

@mend-for-github-com mend-for-github-com bot changed the title CVE-2023-22102 (High) detected in mysql-connector-j-8.0.33.jar CVE-2023-22102 (High) detected in mysql-connector-j-8.0.33.jar - autoclosed Feb 15, 2024
Copy link
Contributor Author

✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.

@github-project-automation github-project-automation bot moved this from Unplanned to Done in Data Prepper Tracking Board Feb 15, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource
Projects
Development

No branches or pull requests

2 participants