A malicious actor can read arbitrary files from a client that uses ruby-mysql to communicate to a rogue MySQL server and issue database queries. In these cases, the server has the option to create a database reply using the LOAD DATA LOCAL statement, which instructs the client to provide additional data from a local file readable by the client (and not a "local" file on the server).
{ "nvd_published_at": "2022-06-28T17:15:00Z", "cwe_ids": [ "CWE-610" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-07-05T22:08:34Z" }