blob: 620005c839264c26385189020c615a03a539638f [file] [log] [blame]
id: GO-TEST-ID
modules:
- module: github.com/pingcap/tidb
vulnerable_at: 1.0.9
- module: github.com/pingcap/tidb
versions:
- introduced: 6.2.0
summary: TiDB vulnerable to Use of Externally-Controlled Format String
description: |-
TiDB server (importer CLI tool) prior to version 6.4.0 & 6.1.3 is vulnerable to
data source name injection. The database name for generating and inserting data
into a database does not properly sanitize user input which can lead to
arbitrary file reads."
cves:
- CVE-2022-3023
ghsas:
- GHSA-7fxj-fr3v-r9gj
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-3023
- web: https://github.com/pingcap/tidb/commit/d0376379d615cc8f263a0b17c031ce403c8dcbfb
- web: https://advisory.dw1.io/45
- package: https://github.com/pingcap/tidb
- web: https://huntr.dev/bounties/120f1346-e958-49d0-b66c-0f889a469540
notes:
- 'create: unsupported version range event models.Event{Introduced:"", Fixed:"", LastAffected:"6.1.2", Limit:""}'
- 'create: unsupported version range event models.Event{Introduced:"", Fixed:"", LastAffected:"6.4.0-alpha1", Limit:""}'
- 'lint: github.com/pingcap/tidb: bad version "6.2.0": github.com/pingcap/tidb@v6.2.0: invalid version: should be v0 or v1, not v6'