CVE-2024-23689

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-23689
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-23689.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-23689
Aliases
Published
2024-01-19T21:15:10Z
Modified
2024-10-12T11:18:35.116810Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Exposure of sensitive information in exceptions in ClichHouse's clickhouse-r2dbc, com.clickhouse:clickhouse-jdbc, and com.clickhouse:clickhouse-client versions less than 0.4.6 allows unauthorized users to gain access to client certificate passwords via client exception logs. This occurs when 'sslkey' is specified and an exception, such as a ClickHouseException or SQLException, is thrown during database operations; the certificate password is then included in the logged exception message.

References

Affected packages

Git / github.com/clickhouse/clickhouse-java

Affected ranges

Type
GIT
Repo
https://github.com/clickhouse/clickhouse-java
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.2.2

release_0.*

release_0.1.13
release_0.1.14
release_0.1.15
release_0.1.16
release_0.1.17
release_0.1.18
release_0.1.19
release_0.1.20
release_0.1.21
release_0.1.22
release_0.1.23
release_0.1.24
release_0.1.25
release_0.1.26
release_0.1.27
release_0.1.28
release_0.1.29
release_0.1.30
release_0.1.31
release_0.1.32
release_0.1.33
release_0.1.34
release_0.1.36
release_0.1.37
release_0.1.38
release_0.1.39
release_0.1.40
release_0.1.41
release_0.1.42
release_0.1.43
release_0.1.44
release_0.1.45
release_0.1.46
release_0.1.47
release_0.1.48
release_0.1.50
release_0.1.51
release_0.1.52
release_0.1.53
release_0.1.54
release_0.1.55
release_0.2
release_0.2.3
release_0.2.4

v0.*

v0.2.5
v0.2.6
v0.3.0
v0.3.1
v0.3.1-patch
v0.3.2
v0.3.2-patch1
v0.3.2-patch10
v0.3.2-patch11
v0.3.2-patch2
v0.3.2-patch3
v0.3.2-patch4
v0.3.2-patch5
v0.3.2-patch6
v0.3.2-patch7
v0.3.2-patch8
v0.3.2-patch9
v0.3.2-test1
v0.3.2-test2
v0.3.2-test3
v0.4.0
v0.4.1
v0.4.2
v0.4.3
v0.4.4
v0.4.5