MySQL Enterprise Monitor 3.1.x < 3.1.6.7959 Java Object Deserialization RCE (January 2017 CPU)

critical Nessus Plugin ID 96768

Synopsis

A web application running on the remote host is affected by a remote code execution vulnerability.

Description

According to its self-reported version, the MySQL Enterprise Monitor application running on the remote host is 3.1.x prior to 3.1.6.7959.
It is, therefore, affected by a remote code execution vulnerability in the JMXInvokerServlet interface due to improper validation of Java objects before deserialization. An authenticated, remote attacker can exploit this to execute arbitrary code. (CVE-2015-7501)

Solution

Upgrade to MySQL Enterprise Monitor version 3.1.6.7959 or later as referenced in the January 2017 Oracle Critical Patch Update advisory.

See Also

http://www.nessus.org/u?0752b1b7

http://www.nessus.org/u?a1c38e52

http://www.nessus.org/u?9c6d83db

Plugin Details

Severity: Critical

ID: 96768

File Name: mysql_enterprise_monitor_3_1_6_7959.nasl

Version: 1.6

Type: remote

Family: CGI abuses

Published: 1/25/2017

Updated: 11/13/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 9.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2015-7501

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:oracle:mysql_enterprise_monitor

Required KB Items: installed_sw/MySQL Enterprise Monitor, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/20/2017

Vulnerability Publication Date: 1/28/2015

Exploitable With

CANVAS (CANVAS)

Reference Information

CVE: CVE-2015-7501

BID: 78215

CERT: 576313