First published: Fri Jan 19 2024(Updated: )
Exposure of sensitive information in exceptions in ClickHouse's clickhouse-r2dbc, com.clickhouse:clickhouse-jdbc, and com.clickhouse:clickhouse-client versions less than 0.4.6 allows unauthorized users to gain access to client certificate passwords via client exception logs. This occurs when 'sslkey' is specified and an exception, such as a ClickHouseException or SQLException, is thrown during database operations; the certificate password is then included in the logged exception message.
Affected Software | Affected Version | How to fix |
---|---|---|
maven/com.clickhouse:clickhouse-client | <0.4.6 | 0.4.6 |
maven/com.clickhouse:clickhouse-jdbc | <0.4.6 | 0.4.6 |
maven/com.clickhouse:clickhouse-r2dbc | <0.4.6 | 0.4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of GHSA-3p77-wg4c-qm24 is categorized as moderate due to the exposure of sensitive information.
To fix GHSA-3p77-wg4c-qm24, update the affected packages to version 0.4.6 or higher.
GHSA-3p77-wg4c-qm24 affects com.clickhouse:clickhouse-client, com.clickhouse:clickhouse-jdbc, and com.clickhouse:clickhouse-r2dbc versions less than 0.4.6.
GHSA-3p77-wg4c-qm24 exposes client certificate passwords through client exception logs.
Yes, unauthorized users may gain access to sensitive information due to the vulnerability in GHSA-3p77-wg4c-qm24.