MySQL command-line client HTML injection vulnerability

Description

The mysql command-line client does not quote HTML special characters like < in its output. This allows an attacker who is able to write data into a table to hide or modify records in the output, and to inject potentially dangerous code, e. g. Javascript to perform cross-site scripting or cross-site request forgery attacks.

How to reproduce

$ mysql --html --execute "select '<a>'" ...
<TABLE BORDER=1><TR><TH><a></TH></TR><TR><TD><a></TD></TR></TABLE>

Affected versions

All.

Resolution

Users are advised to install the available patch from http://bugs.mysql.com/bug.php?id=27884.

Workaround

If another resolution is not feasible, users are advised to modify their SELECT statements to filter out the characters < and &:

SELECT REPLACE(REPLACE(...,'&','&amp;'),'<','&lt;') AS ...;

This workaround is incompatible with the described resolution and should be reversed after installation of the patch.

Timeline

2007-04-17 Opened bug on mysql.com

2008-05-01 Patch available

Resources

The bug is filed on http://bugs.mysql.com/bug.php?id=27884.

This advisory is available from https://henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability/.


Thomas Henlich, Dipl.-Ing. Thomas Henlich - Ingenieurdienstleistungen & Technische Beratung, Heilbronn (Datenschutz & Impressum)