Description:

ShardingSphere-Proxy with MySQL protocol didn't cleanup session completely 
after client authentication failed, which allows an attacker to execute normal 
commands by constructing a special MySQL client. This vulnerability has been 
fixed in ShardingSphere 5.3.0.

References:

https://shardingsphere.apache.org
https://www.cve.org/CVERecord?id=CVE-2022-45347

Reply via email to