FreeBSD : mysql -- command line client input validation vulnerability (4775c807-8f30-11dd-821f-001cc0377035)

low Nessus Plugin ID 34390
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 3.8


The remote FreeBSD host is missing one or more security-related updates.


Thomas Henlich reports :

The mysql command-line client does not quote HTML special characters like < in its output. This allows an attacker who is able to write data into a table to hide or modify records in the output, and to inject potentially dangerous code, e. g. JavaScript to perform cross-site scripting or cross-site request forgery attacks.


Update the affected packages.

See Also

Plugin Details

Severity: Low

ID: 34390

File Name: freebsd_pkg_4775c8078f3011dd821f001cc0377035.nasl

Version: 1.18

Type: local

Published: 10/13/2008

Updated: 1/6/2021

Dependencies: ssh_get_info.nasl

Risk Information

Risk Factor: Low

VPR Score: 3.8

CVSS v2.0

Base Score: 2.6

Temporal Score: 2.1

Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N

Temporal Vector: E:F/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:mysql-client, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/1/2008

Vulnerability Publication Date: 4/17/2007

Reference Information

CVE: CVE-2008-4456

BID: 31486

CWE: 79