Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2021-27928

Description

A remote code execution issue was discovered in MariaDB 10.2 before 10.2.37, 10.3 before 10.3.28, 10.4 before 10.4.18, and 10.5 before 10.5.9; Percona Server through 2021-03-03; and the wsrep patch through 2021-03-03 for MySQL. An untrusted search path leads to eval injection, in which a database SUPER user can execute OS commands after modifying wsrep_provider and wsrep_notify_cmd. NOTE: this does not affect an Oracle product.

POC

Reference

- http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html

Github

- https://github.com/0x7n6/OSCP

- https://github.com/0xStrygwyr/OSCP-Guide

- https://github.com/0xZipp0/OSCP

- https://github.com/0xaniketB/HackTheBox-Shibboleth

- https://github.com/0xsyr0/OSCP

- https://github.com/AMatheusFeitosaM/OSCP-Cheat

- https://github.com/ARPSyndicate/cvemon

- https://github.com/Al1ex/CVE-2021-27928

- https://github.com/Al1ex/CVE-2021-4034

- https://github.com/CatsMeow492/Shibboleth

- https://github.com/EnriqueSanchezdelVillar/NotesHck

- https://github.com/Faizan-Khanx/OSCP

- https://github.com/GatoGamer1155/CVE-2021-27928

- https://github.com/H0j3n/EzpzCheatSheet

- https://github.com/H0j3n/EzpzShell

- https://github.com/LalieA/CVE-2021-27928

- https://github.com/Ly0nt4r/OSCP

- https://github.com/NaInSec/CVE-PoC-in-GitHub

- https://github.com/ReflectedThanatos/OSCP-cheatsheet

- https://github.com/SYRTI/POC_to_review

- https://github.com/SantoriuHen/NotesHck

- https://github.com/SenukDias/OSCP_cheat

- https://github.com/Shenkongyin/CUC-2023

- https://github.com/SirElmard/ethical_hacking

- https://github.com/Smoothss/CUC-2023

- https://github.com/VishuGahlyan/OSCP

- https://github.com/WhooAmii/POC_to_review

- https://github.com/anquanscan/sec-tools

- https://github.com/ayushkumar123a/cybersecurity-task1-portscan

- https://github.com/e-hakson/OSCP

- https://github.com/eljosep/OSCP-Guide

- https://github.com/exfilt/CheatSheet

- https://github.com/fazilbaig1/oscp

- https://github.com/fenipr/Shibboleth

- https://github.com/jitmondal1/OSCP

- https://github.com/k0mi-tg/CVE-POC

- https://github.com/karlvbiron/CVEExplorer

- https://github.com/kgwanjala/oscp-cheatsheet

- https://github.com/manas3c/CVE-POC

- https://github.com/n0-traces/cve_monitor

- https://github.com/nitishbadole/oscp-note-3

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/oscpname/OSCP_cheat

- https://github.com/parth45/cheatsheet

- https://github.com/revanmalang/OSCP

- https://github.com/shamo0/CVE-2021-27928-POC

- https://github.com/soosmile/POC

- https://github.com/superfish9/pt

- https://github.com/trhacknon/Pocingit

- https://github.com/txuswashere/OSCP

- https://github.com/whoforget/CVE-POC

- https://github.com/will5810/SecureCoding-Study

- https://github.com/xhref/OSCP

- https://github.com/youwizard/CVE-POC

- https://github.com/yukitsukai47/PenetrationTesting_cheatsheet

- https://github.com/zecool/cve