logo

CVE-2024-23689 com.clickhouse:clickhouse-client

Package

Manager: maven
Name: com.clickhouse:clickhouse-client
Vulnerable Version: >=0 <0.4.6

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00965 pctl0.75681

Details

Exposure of sensitive information in ClickHouse Exposure of sensitive information in exceptions in ClickHouse's clickhouse-r2dbc, com.clickhouse:clickhouse-jdbc, and com.clickhouse:clickhouse-client versions less than 0.4.6 allows unauthorized users to gain access to client certificate passwords via client exception logs. This occurs when 'sslkey' is specified and an exception, such as a ClickHouseException or SQLException, is thrown during database operations; the certificate password is then included in the logged exception message.

Metadata

Created: 2024-01-19T21:30:36Z
Modified: 2025-05-30T16:31:28Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/01/GHSA-3p77-wg4c-qm24/GHSA-3p77-wg4c-qm24.json
CWE IDs: ["CWE-209"]
Alternative ID: GHSA-3p77-wg4c-qm24
Finding: F037
Auto approve: 1