Vulnerability Details : CVE-2022-31011
TiDB is an open-source NewSQL database that supports Hybrid Transactional and Analytical Processing (HTAP) workloads. Under certain conditions, an attacker can construct malicious authentication requests to bypass the authentication process, resulting in privilege escalation or unauthorized access. Only users using TiDB 5.3.0 are affected by this vulnerability. TiDB version 5.3.1 contains a patch for this issue. Other mitigation strategies include turning off Security Enhanced Mode (SEM), disabling local login for non-root accounts, and ensuring that the same IP cannot be logged in as root and normal user at the same time.
Vulnerability category: BypassGain privilege
Products affected by CVE-2022-31011
- cpe:2.3:a:pingcap:tidb:5.3.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-31011
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 10 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-31011
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
GitHub, Inc. |
CWE ids for CVE-2022-31011
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: security-advisories@github.com (Primary)
References for CVE-2022-31011
-
https://github.com/pingcap/tidb/releases/tag/v5.3.1
Release tidb-server v5.3.1 · pingcap/tidb · GitHubRelease Notes;Third Party Advisory
-
https://github.com/pingcap/tidb/security/advisories/GHSA-4whx-7p29-mq22
TiDB authentication bypass vulnerability · Advisory · pingcap/tidb · GitHubMitigation;Third Party Advisory
Jump to