A malicious actor can read arbitrary files from a client that uses ruby-mysql to communicate to a rogue MySQL server and issue database queries. In these cases, the server has the option to create a database reply using the LOAD DATA LOCAL statement, which instructs the client to provide additional data from a local file readable by the client (and not a "local" file on the server).
{
"nvd_published_at": "2022-06-28T17:15:00Z",
"severity": "MODERATE",
"github_reviewed_at": "2022-07-05T22:08:34Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-610"
]
}