A malicious MySQL server can request local file content from a client using ruby-mysql prior to version 2.10.0 without explicit authorization from the user. This issue was resolved in version 2.10.0 and later.
Solution:
The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.
Link | Tags |
---|---|
https://www.rapid7.com/blog/post/2022/06/28/cve-2021-3779-ruby-mysql-gem-client-file-read-fixed/ | mitigation third party advisory exploit |