blob: 953e4e34b046a302ca94bdb25a7c61eda868923e [file] [log] [blame]
id: GO-ID-PENDING
modules:
- module: github.com/pingcap/tidb
non_go_versions:
- introduced: 6.2.0
unsupported_versions:
- last_affected: 6.1.2
- last_affected: 6.4.0-alpha1
vulnerable_at: 1.0.9
summary: TiDB vulnerable to Use of Externally-Controlled Format String in github.com/pingcap/tidb
description: |-
TiDB server (importer CLI tool) prior to version 6.4.0 & 6.1.3 is vulnerable to
data source name injection. The database name for generating and inserting data
into a database does not properly sanitize user input which can lead to
arbitrary file reads."
cves:
- CVE-2022-3023
ghsas:
- GHSA-7fxj-fr3v-r9gj
references:
- advisory: https://github.com/advisories/GHSA-7fxj-fr3v-r9gj
- fix: https://github.com/pingcap/tidb/commit/d0376379d615cc8f263a0b17c031ce403c8dcbfb
- web: https://advisory.dw1.io/45
- web: https://huntr.dev/bounties/120f1346-e958-49d0-b66c-0f889a469540
notes:
- lint: 'modules[0] "github.com/pingcap/tidb": unsupported_versions: found 2 (want none)'
source:
id: GHSA-7fxj-fr3v-r9gj
created: 1999-01-01T00:00:00Z
review_status: REVIEWED