Skip to content

TiDB - Unauthenticated Access

ID: tidb-unauth

Severity: high

Author: lu4nx

Tags: network,tidb,unauth,misconfig,tcp

TiDB server was able to be accessed because no authentication was required.

id: tidb-unauth
info:
name: TiDB - Unauthenticated Access
author: lu4nx
severity: high
description: TiDB server was able to be accessed because no authentication was required.
metadata:
max-request: 1
zoomeye-query: '"tidb" && port=4000'
tags: network,tidb,unauth,misconfig,tcp
tcp:
- inputs:
- read: 1024 # skip handshake packet
- data: b200000185a6ff0900000001ff0000000000000000000000000000000000000000000000726f6f7400006d7973716c5f6e61746976655f70617373776f72640075045f70696406313337353030095f706c6174666f726d067838365f3634035f6f73054c696e75780c5f636c69656e745f6e616d65086c69626d7973716c076f735f757365720578787878780f5f636c69656e745f76657273696f6e06382e302e32360c70726f6772616d5f6e616d65056d7973716c # authentication
type: hex
host:
- "{{Hostname}}"
port: 4000
read-size: 1024
matchers:
- type: binary
binary:
# resp format:
# 07: length, 02: sequence number, 00: success
- "0700000200000002000000"
# digest: 4b0a00483046022100e0d51647272d21621ca0a4efe9d1f9bdbed44cf7acc0a8dfe0a039a25fda4360022100ef054053aeaf6eb09d6ad79d089f604404b0e31586be0b8e622f6b46d17c8801:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "network/misconfig/tidb-unauth.yaml"

View on Github