Miggo Logo

CVE-2022-31011: TiDB authentication bypass vulnerability

7.8

CVSS Score
3.1

Basic Information

EPSS Score
0.22696%
Published
6/6/2022
Updated
2/1/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/pingcap/tidbgo= 5.3.05.3.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The provided information does not contain concrete technical details about the vulnerable code path or specific functions. While the vulnerability relates to authentication bypass in Security Enhanced Mode (SEM), there are no commit diffs, patch details, or code references that explicitly identify vulnerable functions. The workaround suggestions and CWE-287 classification indicate a logic flaw in authentication handling when SEM is enabled, but insufficient technical details prevent confident identification of specific functions. The absence of GitHub patch information and commit diffs makes it impossible to perform code-level analysis to pinpoint vulnerable functions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t Un**r **rt*in *on*itions, *n *tt**k*r **n *onstru*t m*li*ious *ut**nti**tion r*qu*sts to *yp*ss t** *ut**nti**tion pro**ss, r*sultin* in privil*** *s**l*tion or un*ut*oriz** ****ss. Only us*rs usin* Ti** *.*.* *r* *****t** *y t*is vuln*r**

Reasoning

T** provi*** in*orm*tion *o*s not *ont*in *on*r*t* t***ni**l **t*ils **out t** vuln*r**l* *o** p*t* or sp**i*i* *un*tions. W*il* t** vuln*r**ility r*l*t*s to *ut**nti**tion *yp*ss in S**urity *n**n*** Mo** (S*M), t**r* *r* no *ommit *i**s, p*t** **t*