First published: Tue Oct 15 2024(Updated: )
Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Client accessible data as well as unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
MySQL | >=8.0.0<=8.0.39 | |
MySQL | >=8.4.0<=8.4.2 | |
MySQL | =9.0.0 | |
MySQL | =9.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21247 is classified as an easily exploitable vulnerability allowing high-privileged attackers network access.
CVE-2024-21247 affects MySQL Client versions 8.0.39 and earlier, 8.4.2 and earlier, and 9.0.1 and earlier.
To remediate CVE-2024-21247, users should upgrade their MySQL Client to a version later than those specified as vulnerable.
CVE-2024-21247 can be exploited by high-privileged attackers with network access via multiple protocols.
Yes, CVE-2024-21247 is a vulnerability found specifically in the mysqldump component of MySQL.