CVE-2022-31011

TiDB is an open-source NewSQL database that supports Hybrid Transactional and Analytical Processing (HTAP) workloads. Under certain conditions, an attacker can construct malicious authentication requests to bypass the authentication process, resulting in privilege escalation or unauthorized access. Only users using TiDB 5.3.0 are affected by this vulnerability. TiDB version 5.3.1 contains a patch for this issue. Other mitigation strategies include turning off Security Enhanced Mode (SEM), disabling local login for non-root accounts, and ensuring that the same IP cannot be logged in as root and normal user at the same time.
References
Link Resource
https://github.com/pingcap/tidb/releases/tag/v5.3.1 Release Notes Third Party Advisory
https://github.com/pingcap/tidb/security/advisories/GHSA-4whx-7p29-mq22 Mitigation Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:pingcap:tidb:5.3.0:*:*:*:*:*:*:*

Information

Published : 2022-05-31 13:15

Updated : 2022-06-10 06:26


NVD link : CVE-2022-31011

Mitre link : CVE-2022-31011


JSON object : View

CWE
CWE-287

Improper Authentication

Advertisement

dedicated server usa

Products Affected

pingcap

  • tidb