CVE-2021-27928
high-risk
Published 2021-03-19
A remote code execution issue was discovered in MariaDB 10.2 before 10.2.37, 10.3 before 10.3.28, 10.4 before 10.4.18, and 10.5 before 10.5.9; Percona Server through 2021-03-03; and the wsrep patch through 2021-03-03 for MySQL. An untrusted search path leads to eval injection, in which a database SUPER user can execute OS commands after modifying wsrep_provider and wsrep_notify_cmd. NOTE: this does not affect an Oracle product.
Do I need to act?
!
48.9% chance of exploitation in next 30 days
EPSS score — higher than 51% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.2/10
High
NETWORK
/ LOW complexity
Affected Products (4)
Affected Vendors
References (18)
Issue Tracking
https://jira.mariadb.org/browse/MDEV-25179
Release Notes
https://mariadb.com/kb/en/mariadb-10237-release-notes/
Release Notes
https://mariadb.com/kb/en/mariadb-10328-release-notes/
Release Notes
https://mariadb.com/kb/en/mariadb-10418-release-notes/
Release Notes
https://mariadb.com/kb/en/mariadb-1059-release-notes/
Vendor Advisory
https://mariadb.com/kb/en/security/
Third Party Advisory
https://security.gentoo.org/glsa/202105-28
Issue Tracking
https://jira.mariadb.org/browse/MDEV-25179
Release Notes
https://mariadb.com/kb/en/mariadb-10237-release-notes/
Release Notes
https://mariadb.com/kb/en/mariadb-10328-release-notes/
Release Notes
https://mariadb.com/kb/en/mariadb-10418-release-notes/
Release Notes
https://mariadb.com/kb/en/mariadb-1059-release-notes/
Vendor Advisory
https://mariadb.com/kb/en/security/
Third Party Advisory
https://security.gentoo.org/glsa/202105-28
54
/ 100
high-risk
Severity
26/34 · High
Exploitability
18/34 · Moderate
Exposure
10/34 · Low