Description: ShardingSphere-Proxy with MySQL protocol didn't cleanup session completely after client authentication failed, which allows an attacker to execute normal commands by constructing a special MySQL client. This vulnerability has been fixed in ShardingSphere 5.3.0.
References: https://shardingsphere.apache.org https://www.cve.org/CVERecord?id=CVE-2022-45347