CVE-2024-23689: Generation of Error Message Containing Sensitive Information
(updated )
Exposure of sensitive information in exceptions in ClichHouse’s clickhouse-r2dbc, com.clickhouse:clickhouse-jdbc, and com.clickhouse:clickhouse-client versions less than 0.4.6 allows unauthorized users to gain access to client certificate passwords via client exception logs. This occurs when ‘sslkey’ is specified and an exception, such as a ClickHouseException or SQLException, is thrown during database operations; the certificate password is then included in the logged exception message.
References
- github.com/ClickHouse/clickhouse-java/issues/1331
- github.com/ClickHouse/clickhouse-java/pull/1334
- github.com/ClickHouse/clickhouse-java/releases/tag/v0.4.6
- github.com/ClickHouse/clickhouse-java/security/advisories/GHSA-g8ph-74m6-8m7r
- github.com/advisories/GHSA-3p77-wg4c-qm24
- github.com/advisories/GHSA-g8ph-74m6-8m7r
- nvd.nist.gov/vuln/detail/CVE-2024-23689
- vulncheck.com/advisories/vc-advisory-GHSA-g8ph-74m6-8m7r
Detect and mitigate CVE-2024-23689 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →