Disclosure of Fixed Vulnerabilities

Vulnerability name
Affected component
Publish Time
CVE
CVSS
Affected version
Fixed version
Issue description
Buffer Handling Bug in (*Column).GetDecimal Causing Query Failure TiDB Server

09/03/2024

CVSS v3 score:4.3 => Medium severity
<= 8.1.0
<= 7.5.3
<= 7.1.5
>= 8.1.1
>= 7.5.4
>= 7.1.6

A potential buffer overflow was reported in the (*Column).GetDecimal component. This issue can cause a single query to fail when using RemoveUnnecessaryFirstRow, as it checks expressions between Agg and GroupBy without validating the return type. This does not result in a Denial of Service (DoS) for other users. The impact is limited to the failing query and reflects a complex query handling bug rather than a service-wide disruption.

TiDB ExplainExpressionList buffer overflow classified as query bug TiDB Server
09/03/2024
CVSS v3 score:9.8 => Critical severity
8.1.0
<= 7.5.2
<= 7.1.5
<= 6.5.10
>= 8.1.1
>= 7.5.3
>= 7.1.6
>= 6.5.11

A buffer overflow was identified in TiDB’s expression.ExplainExpressionList component. While it appeared that a crafted input might cause a Denial of Service (DoS), PingCAP’s analysis confirmed that the issue does not lead to service interruption or broader security risks. Instead, it is classified as a complex query bug rather than a DoS vulnerability.

Nil Pointer Dereference in TiDB expression.inferCollation TiDB Server
06/25/2024
CVSS v3 score:5.4 => Medium severity
<= 8.1.0
<= 7.5.2
<= 7.1.5
<= 6.5.9
>= 8.1.1
>= 7.5.3
>= 7.1.6
>= 6.5.10

A nil pointer dereference was discovered in TiDB within the expression.inferCollation function. This issue may cause specific SQL statements to return errors, but it does not impact other connections or users, nor does it result in a denial-of-service condition.

NULL Pointer Dereference in TiDB SortedRowContainer
TiDB Server
05/24/2024
CVSS v3 score:7.5 => High severity
<= 7.5.1
<= 7.1.5
<= 6.5.9
>= 8.1.0
>= 7.5.2
>= 7.1.6
>= 6.5.10

A NULL pointer dereference was discovered in TiDB within the SortedRowContainer component. This issue may cause a single query to fail and the corresponding session to disconnect, but it does not affect other connections or users.

Buffer Overflow in TiDB Leading to Single Connection Crash
TiDB Server
05/24/2024
CVSS v3 score:6.5 => Medium severity
<= 7.5.0
<= 7.1.3
>= 7.5.1
>= 7.1.4
>= 8.0.0

A buffer overflow vulnerability was discovered in TiDB, which could cause a single user connection to crash. The client can automatically reconnect by resending the command, and this issue does not affect other users or lead to a broader denial-of-service condition.

SSRF Vulnerability in TiDB Dashboard
TiDB Dashboard

07/31/2023

N/A
CVSS v3 score:7.3 => High severity
7.2.0-DMR
7.3.0-DMR
<= 6.5.3
<= 7.1.1
7.4.0-DMR
>= 6.5.4
>= 7.1.2
>= 7.5.0
In certain versions, the TiDB Dashboard component may, after cluster startup, allow local port status to be inferred through internal debugging-related interfaces, which could result in an information disclosure risk.
TiFlash opens redundant ports
TiFlash Server
06/19/2023
N/A
CVSS v3
score: 8.6 => High severity
>=4.0.0 & <7.1.0
7.1.0(TiUP>=v1.12.5 or TiDB Operator >= v1.5.0)
 In certain versions, the component opens an internal TCP communication port after startup. This port does not enforce strict access control or authentication, which under specific conditions may allow unauthorized access and potentially lead to data being queried or modified.
TiDB DSN injection
TiDB Server
11/04/2022
CVSS v3
score: 9.8 => Critical severity
<= 6.1.2
>= 6.2.0 & <= 6.4.0-alpha1
TiDB server (importer CLI tool) prior to version 6.4.0 & 6.1.3 is vulnerable to data source name injection. The database name for generating and inserting data into a database does not properly sanitize user input which can lead to arbitrary file reads.
TiDB authentication bypass vulnerability
TiDB Server
05/31/2022
CVSS v3 score: 8.4 => High severity
5.3.0
Under certain conditions, an attacker can construct malicious authentication requests to bypass the authentication process, resulting in privilege escalation or unauthorized access. Only users using TiDB 5.3.0 are affected by this vulnerability. TiDB version 5.3.1 contains a patch for this issue. Other mitigation strategies include turning off Security Enhanced Mode (SEM), disabling local login for non-root accounts, and ensuring that the same IP cannot be logged in as root and normal user at the same time.
TiDB DML SQL execution vulnerability
TiDB Server
09/27/2021
N/A
CVSS v3 score: 8.2 => High severity
<=4.0.14
<=5.0.3
<=5.1.1
There is a SQL injection vulnerability in the TiDB http status service, through which an attacker can gain database permissions.
TiDB caching_sha2_password bypasses password authentication login
TiDB Server
09/29/2020
N/A
CVSS v3 score: 7.6 => High severity
<=4.0.6
Under certain conditions, users can bypass the authentication mechanism of caching_sha2_password to log in to TiDB.