SQL tries to read user data from the My-Sql user table, which usually contains a list of users and hosts that are allowed access to this my-sql server.
It seems to me that perp is trying to trick mysql into dropping the contents of the user table so that they can record the password hashes offline and dcrypt them to find valid logins.
If your web application uses a login that will allow access to the mysql user table, this is a serious security flaw, if it uses a login that only permits the tables required for the application, then no information can be obtained.
Security Council . When setting up any database, it is vital that the application uses this with the login / access role, which provides it ONLY what it needs.
If your application only ever needs to read data and never modify it, then it should never have any privileges other than reading. You always need to double-check this, because most database systems will by default create user roles for a given database with full read, create, and modify access.
Always create a specific user, just for this db and / or collection of tables, and always provide that user with the absolute minimum that is required if your application is then hacked by attacking a script with several sites, most of them are going to gain access too - this is one specific database.
source share