1.3 Disable MySQL Command History

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Disabling the MySQL command history reduces the probability of exposing sensitive information, such as passwords and encryption keys.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
NOTE : Nessus has not performed this query, and this check is only provided for informational purposes.

Solution

Perform the following steps to remediate this setting: Remove .mysql_history if it exists. Use either of the techniques below to prevent it from being created again: Set the MYSQL_HISTFILE environment variable to /dev/null. This will need to be placed in the shell's startup script. Create $HOME/.mysql_history as a symbolic to /dev/null. > ln -s /dev/null $HOME/.mysql_history

See Also

https://workbench.cisecurity.org/files/1619