Headline
GHSA-3p77-wg4c-qm24: Exposure of sensitive information in ClickHouse
Exposure of sensitive information in exceptions in ClickHouse’s clickhouse-r2dbc, com.clickhouse:clickhouse-jdbc, and com.clickhouse:clickhouse-client versions less than 0.4.6 allows unauthorized users to gain access to client certificate passwords via client exception logs. This occurs when ‘sslkey’ is specified and an exception, such as a ClickHouseException or SQLException, is thrown during database operations; the certificate password is then included in the logged exception message.
Skip to content
Actions
Automate any workflow
Packages
Host and manage packages
Security
Find and fix vulnerabilities
Codespaces
Instant dev environments
Copilot
Write better code with AI
Code review
Manage code changes
Issues
Plan and track work
Discussions
Collaborate outside of code
GitHub Sponsors
Fund open source developers
* The ReadME Project
GitHub community articles
- Pricing
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2024-23689
Exposure of sensitive information in ClickHouse
Moderate severity GitHub Reviewed Published Jan 19, 2024 to the GitHub Advisory Database • Updated Jan 23, 2024
Package
maven com.clickhouse:clickhouse-client (Maven)
Affected versions
< 0.4.6
maven com.clickhouse:clickhouse-jdbc (Maven)
maven com.clickhouse:clickhouse-r2dbc (Maven)
Description
Published to the GitHub Advisory Database
Jan 19, 2024
Last updated
Jan 23, 2024