| id: GO-ID-PENDING |
| modules: |
| - module: github.com/pingcap/tidb |
| non_go_versions: |
| - introduced: 6.2.0 |
| unsupported_versions: |
| - version: 6.1.2 |
| type: last_affected |
| - version: 6.4.0-alpha1 |
| type: last_affected |
| vulnerable_at: 1.0.9 |
| summary: TiDB vulnerable to Use of Externally-Controlled Format String in github.com/pingcap/tidb |
| description: |- |
| TiDB server (importer CLI tool) prior to version 6.4.0 & 6.1.3 is vulnerable to |
| data source name injection. The database name for generating and inserting data |
| into a database does not properly sanitize user input which can lead to |
| arbitrary file reads." |
| cves: |
| - CVE-2022-3023 |
| ghsas: |
| - GHSA-7fxj-fr3v-r9gj |
| references: |
| - advisory: https://github.com/advisories/GHSA-7fxj-fr3v-r9gj |
| - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-3023 |
| - fix: https://github.com/pingcap/tidb/commit/d0376379d615cc8f263a0b17c031ce403c8dcbfb |
| - web: https://advisory.dw1.io/45 |
| - web: https://huntr.dev/bounties/120f1346-e958-49d0-b66c-0f889a469540 |
| source: |
| id: GHSA-7fxj-fr3v-r9gj |
| created: 1999-01-01T00:00:00Z |
| review_status: UNREVIEWED |