CVE-2012-2122
NUCLEIOracle Mysql - Authentication Bypass
Title source: ruleDescription
sql/password.c in Oracle MySQL 5.1.x before 5.1.63, 5.5.x before 5.5.24, and 5.6.x before 5.6.6, and MariaDB 5.1.x before 5.1.62, 5.2.x before 5.2.12, 5.3.x before 5.3.6, and 5.5.x before 5.5.23, when running in certain environments with certain implementations of the memcmp function, allows remote attackers to bypass authentication by repeatedly authenticating with the same incorrect password, which eventually causes a token comparison to succeed due to an improperly-checked return value.
Exploits (6)
nomisec
WRITEUP
1 stars
by cyberharsh · poc
https://github.com/cyberharsh/Oracle-mysql-CVE-2012-2122
exploitdb
WORKING POC
VERIFIED
by David Kennedy (ReL1K) · pythonremotemultiple
https://www.exploit-db.com/exploits/19092
metasploit
WORKING POC
by theLightCosine, jcran · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/mysql/mysql_authbypass_hashdump.rb
Nuclei Templates (1)
MySQL - Authentication Bypass
MEDIUMVERIFIEDby pussycat0x
Shodan:
product:"MySQL" || product:"mysql"
References (11)
Scores
EPSS
0.9406
EPSS Percentile
99.9%
Classification
CWE
CWE-287
Status
draft
Affected Products (50)
oracle/mysql
oracle/mysql
oracle/mysql
oracle/mysql
oracle/mysql
oracle/mysql
oracle/mysql
oracle/mysql
oracle/mysql
oracle/mysql
oracle/mysql
oracle/mysql
oracle/mysql
oracle/mysql
oracle/mysql
... and 35 more
Timeline
Published
Jun 26, 2012
Tracked Since
Feb 18, 2026