CWE-400
ISO27001-A.14.1.2
WASC-10
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Denial of Service (MySQL)

Severity:
Information
Summary

Invicti identified a MySQL denial of service due to too many connections.

Several triggers cause this, including: possible DoS attack, high usage, not optimized MySQL server, or poorly developed server-side code.

Impact
Remediation

In order to fix this problem, you should first determine what causes this. Some suggestions:

  • Check max_connections settings in the MySQL configuration file, which is located in the MySQL installation folder for Windows systems, and /etc/my.cnf for Unix/Linux-like systems.
  • Do not use persistent connections on your code. This is possible only for PHP systems by disabling it through the setting on php.ini.mysql.allow_persistent=Off
  • Ensure you explicitly close the database connections.
  • Ensure you close opened database connections when an error occurs in the code.
  • Lower the MySQL connection timeout.
Required Skills for Successful Exploitation
Actions To Take
Vulnerability Index

You can search and find all vulnerabilities

Select Vulnerability
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Featured resources

Blog

Strengthening enterprise application security: Invicti acquires Kondukto

Blog

Modern AppSec KPIs: Moving from scan counts to real risk reduction

Blog

Friends don’t let friends shift left: Shift smarter with DAST-first AppSec

Blog

Vibe talking: Dan Murphy on the promises, pitfalls, and insecurities of vibe coding

Blog

What lies ahead for CMS.

Blog

How to integrate CMS with other tools.

Blog

Improve user experience through CMS.

Blog

How CMS can benefit e-commerce.

Blog

Stay updated on CMS trends.

Blog

Tips for improving CMS performance.

Blog

Learn how to secure your CMS.

Blog

Explore the advantages of CMS.

Blog

A comprehensive guide to CMS.

Build your resistance to threats. And save hundreds of hours each month.