TiDB Vulnerability Disclosure
Stay informed about the latest vulnerabilities, security advisories, and remediation guidance.
Vulnerability name
|
Affected component
|
Publish Time
|
CVE
|
CVSS
|
Affected version
|
Fixed version
|
Issue description
|
Buffer Handling Bug in (*Column).GetDecimal Causing Query Failure |
TiDB Server |
09/03/2024 |
CVSS v3 score:4.3 => Medium severity
|
<= 8.1.0
<= 7.5.3 <= 7.1.5 |
A potential buffer overflow was reported in the |
||
TiDB ExplainExpressionList buffer overflow classified as query bug |
TiDB Server |
09/03/2024
|
CVSS v3 score:9.8 => Critical severity
|
8.1.0
<= 7.5.2 <= 7.1.5 <= 6.5.10 |
A buffer overflow was identified in TiDB’s |
||
Nil Pointer Dereference in TiDB expression.inferCollation |
TiDB Server |
06/25/2024
|
CVSS v3 score:5.4 => Medium severity
|
<= 8.1.0
<= 7.5.2 <= 7.1.5 <= 6.5.9 |
A nil pointer dereference was discovered in TiDB within the |
||
NULL Pointer Dereference in TiDB SortedRowContainer |
TiDB Server
|
05/24/2024
|
CVSS v3 score:7.5 => High severity
|
<= 7.5.1
<= 7.1.5 <= 6.5.9 |
A NULL pointer dereference was discovered in TiDB within the |
||
Buffer Overflow in TiDB Leading to Single Connection Crash |
TiDB Server
|
05/24/2024
|
CVSS v3 score:6.5 => Medium severity
|
<= 7.5.0
<= 7.1.3 |
A buffer overflow vulnerability was discovered in TiDB, which could cause a single user connection to crash. The client can automatically reconnect by resending the command, and this issue does not affect other users or lead to a broader denial-of-service condition. |
||
SSRF Vulnerability in TiDB Dashboard |
TiDB Dashboard
|
07/31/2023 |
N/A
|
CVSS v3 score:7.3 => High severity
|
7.2.0-DMR
7.3.0-DMR <= 6.5.3 <= 7.1.1 |
In certain versions, the TiDB Dashboard component may, after cluster startup, allow local port status to be inferred through internal debugging-related interfaces, which could result in an information disclosure risk.
|
|
TiFlash opens redundant ports |
TiFlash Server
|
06/19/2023
|
N/A
|
CVSS v3
score: 8.6 => High severity |
>=4.0.0 & <7.1.0
|
7.1.0(TiUP>=v1.12.5 or TiDB Operator >= v1.5.0)
|
In certain versions, the component opens an internal TCP communication port after startup. This port does not enforce strict access control or authentication, which under specific conditions may allow unauthorized access and potentially lead to data being queried or modified.
|
TiDB DSN injection |
TiDB Server
|
11/04/2022
|
CVSS v3
score: 9.8 => Critical severity |
<= 6.1.2
>= 6.2.0 & <= 6.4.0-alpha1
|
TiDB server (importer CLI tool) prior to version 6.4.0 & 6.1.3 is vulnerable to data source name injection. The database name for generating and inserting data into a database does not properly sanitize user input which can lead to arbitrary file reads.
|
||
TiDB authentication bypass vulnerability
|
TiDB Server
|
05/31/2022
|
CVSS v3 score: 8.4 => High severity
|
5.3.0
|
Under certain conditions, an attacker can construct malicious authentication requests to bypass the authentication process, resulting in privilege escalation or unauthorized access. Only users using TiDB 5.3.0 are affected by this vulnerability. TiDB version 5.3.1 contains a patch for this issue. Other mitigation strategies include turning off Security Enhanced Mode (SEM), disabling local login for non-root accounts, and ensuring that the same IP cannot be logged in as root and normal user at the same time.
|
||
TiDB DML SQL execution vulnerability
|
TiDB Server
|
09/27/2021
|
N/A
|
CVSS v3 score: 8.2 => High severity
|
<=4.0.14
<=5.0.3
<=5.1.1
|
There is a SQL injection vulnerability in the TiDB http status service, through which an attacker can gain database permissions.
|
|
TiDB caching_sha2_password bypasses password authentication login
|
TiDB Server
|
09/29/2020
|
N/A
|
CVSS v3 score: 7.6 => High severity
|
<=4.0.6
|
Under certain conditions, users can bypass the authentication mechanism of caching_sha2_password to log in to TiDB.
|