CVE-2024-23689

Exposure of sensitive information in exceptions in ClichHouse's clickhouse-r2dbc, com.clickhouse:clickhouse-jdbc, and com.clickhouse:clickhouse-client versions less than 0.4.6 allows unauthorized users to gain access to client certificate passwords via client exception logs. This occurs when 'sslkey' is specified and an exception, such as a ClickHouseException or SQLException, is thrown during database operations; the certificate password is then included in the logged exception message.
Configurations

Configuration 1 (hide)

cpe:2.3:a:clickhouse:java_libraries:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:58

Type Values Removed Values Added
References () https://github.com/ClickHouse/clickhouse-java/issues/1331 - Exploit, Issue Tracking () https://github.com/ClickHouse/clickhouse-java/issues/1331 - Exploit, Issue Tracking
References () https://github.com/ClickHouse/clickhouse-java/pull/1334 - Issue Tracking, Patch () https://github.com/ClickHouse/clickhouse-java/pull/1334 - Issue Tracking, Patch
References () https://github.com/ClickHouse/clickhouse-java/releases/tag/v0.4.6 - Release Notes () https://github.com/ClickHouse/clickhouse-java/releases/tag/v0.4.6 - Release Notes
References () https://github.com/ClickHouse/clickhouse-java/security/advisories/GHSA-g8ph-74m6-8m7r - Vendor Advisory () https://github.com/ClickHouse/clickhouse-java/security/advisories/GHSA-g8ph-74m6-8m7r - Vendor Advisory
References () https://github.com/advisories/GHSA-g8ph-74m6-8m7r - Third Party Advisory () https://github.com/advisories/GHSA-g8ph-74m6-8m7r - Third Party Advisory
References () https://vulncheck.com/advisories/vc-advisory-GHSA-g8ph-74m6-8m7r - Third Party Advisory () https://vulncheck.com/advisories/vc-advisory-GHSA-g8ph-74m6-8m7r - Third Party Advisory

26 Jan 2024, 14:50

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
First Time Clickhouse
Clickhouse java Libraries
References () https://vulncheck.com/advisories/vc-advisory-GHSA-g8ph-74m6-8m7r - () https://vulncheck.com/advisories/vc-advisory-GHSA-g8ph-74m6-8m7r - Third Party Advisory
References () https://github.com/advisories/GHSA-g8ph-74m6-8m7r - () https://github.com/advisories/GHSA-g8ph-74m6-8m7r - Third Party Advisory
References () https://github.com/ClickHouse/clickhouse-java/releases/tag/v0.4.6 - () https://github.com/ClickHouse/clickhouse-java/releases/tag/v0.4.6 - Release Notes
References () https://github.com/ClickHouse/clickhouse-java/pull/1334 - () https://github.com/ClickHouse/clickhouse-java/pull/1334 - Issue Tracking, Patch
References () https://github.com/ClickHouse/clickhouse-java/security/advisories/GHSA-g8ph-74m6-8m7r - () https://github.com/ClickHouse/clickhouse-java/security/advisories/GHSA-g8ph-74m6-8m7r - Vendor Advisory
References () https://github.com/ClickHouse/clickhouse-java/issues/1331 - () https://github.com/ClickHouse/clickhouse-java/issues/1331 - Exploit, Issue Tracking
CWE CWE-209
CPE cpe:2.3:a:clickhouse:java_libraries:*:*:*:*:*:*:*:*

19 Jan 2024, 22:52

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-19 21:15

Updated : 2024-11-21 08:58


NVD link : CVE-2024-23689

Mitre link : CVE-2024-23689

CVE.ORG link : CVE-2024-23689


JSON object : View

Products Affected

clickhouse

  • java_libraries
CWE
CWE-209

Generation of Error Message Containing Sensitive Information