MySQL Enterprise Monitor 3.3.x < / 3.4.x < / 4.0.x < Multiple Vulnerabilities (January 2018 CPU)

Medium Nessus Plugin ID 106103


A web application running on the remote host is affected by multiple vulnerabilities.


According to its self-reported version, the MySQL Enterprise Monitor application running on the remote host is 3.3.x prior to, 3.4.x prior to, or 4.0.x prior to
It is, therefore, affected by multiple vulnerabilities as noted in the January 2018 Critical Patch Update advisory. Please consult the CVRF details for the applicable CVEs for additional information.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.


Upgrade to MySQL Enterprise Monitor version / or later as referenced in the Oracle security advisory.

See Also

Plugin Details

Severity: Medium

ID: 106103

File Name: mysql_enterprise_monitor_4_0_2_5168.nasl

Version: $Revision: 1.3 $

Type: remote

Family: CGI abuses

Published: 2018/01/17

Modified: 2018/01/18

Dependencies: 46815

Risk Information

Risk Factor: Medium


Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND


Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:oracle:mysql_enterprise_monitor

Required KB Items: installed_sw/MySQL Enterprise Monitor, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2018/01/16

Vulnerability Publication Date: 2018/01/16

Exploitable With

Core Impact

Metasploit (Tomcat RCE via JSP Upload Bypass)

Reference Information

CVE: CVE-2017-3736, CVE-2017-12617

BID: 100954, 101666, 102495

OSVDB: 165922, 168514

IAVA: 2018-A-0033