CVE-2024-23689: CWE-209 Generation of Error Message Containing Sensitive Information
Exposure of sensitive information in exceptions in ClichHouse's clickhouse-r2dbc, com.clickhouse:clickhouse-jdbc, and com.clickhouse:clickhouse-client versions less than 0.4.6 allows unauthorized users to gain access to client certificate passwords via client exception logs. This occurs when 'sslkey' is specified and an exception, such as a ClickHouseException or SQLException, is thrown during database operations; the certificate password is then included in the logged exception message.
AI Analysis
Technical Summary
CVE-2024-23689 is a vulnerability classified under CWE-209, involving the generation of error messages that contain sensitive information. It affects multiple ClickHouse client implementations: clickhouse-r2dbc, clickhouse-jdbc, and clickhouse-client, specifically versions earlier than 0.4.6. The flaw arises when these clients are configured to use SSL client certificates with a password-protected private key ('sslkey' parameter). If an exception occurs during database operations—such as a ClickHouseException or SQLException—the exception message logged includes the client certificate password in plaintext. This leakage occurs because the exception handling code inadvertently incorporates sensitive credential data into error messages. The vulnerability is remotely exploitable (AV:N), requires low privileges (PR:L), and no user interaction (UI:N), with an unchanged scope (S:U). The impact is severe, compromising confidentiality (C:H), integrity (I:H), and availability (A:H) of the system. Although no known exploits are reported in the wild yet, the high CVSS score (8.8) reflects the critical nature of the exposure. This vulnerability can lead to unauthorized access to client certificate passwords, potentially enabling attackers to impersonate legitimate clients or decrypt SSL traffic, severely undermining security.
Potential Impact
For European organizations, the exposure of client certificate passwords can have significant consequences. Many enterprises and public sector entities rely on ClickHouse for analytics and data warehousing, often transmitting sensitive or regulated data over SSL connections. If attackers gain access to these passwords via logs, they could impersonate clients, intercept or manipulate data, or disrupt services. This compromises data confidentiality, integrity, and availability, potentially violating GDPR and other data protection regulations. The breach of client certificates could also facilitate lateral movement within networks or enable further attacks on critical infrastructure. The impact is particularly acute for sectors handling sensitive personal data, financial information, or critical infrastructure telemetry, making remediation urgent to avoid regulatory penalties and operational disruptions.
Mitigation Recommendations
The primary mitigation is to upgrade all affected ClickHouse client libraries (clickhouse-r2dbc, clickhouse-jdbc, clickhouse-client) to version 0.4.6 or later, where this vulnerability is fixed. Organizations should audit their usage of SSL client certificates and avoid logging sensitive information in exception messages. Implement strict logging policies that sanitize or redact sensitive data before writing to logs. Additionally, restrict access to logs to authorized personnel only and monitor logs for any suspicious access patterns. Employ network segmentation and strong access controls to limit exposure if credentials are compromised. Regularly review exception handling code in custom integrations to ensure no sensitive data is exposed. Finally, consider rotating client certificate passwords and associated keys if exposure is suspected.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2024-23689: CWE-209 Generation of Error Message Containing Sensitive Information
Description
Exposure of sensitive information in exceptions in ClichHouse's clickhouse-r2dbc, com.clickhouse:clickhouse-jdbc, and com.clickhouse:clickhouse-client versions less than 0.4.6 allows unauthorized users to gain access to client certificate passwords via client exception logs. This occurs when 'sslkey' is specified and an exception, such as a ClickHouseException or SQLException, is thrown during database operations; the certificate password is then included in the logged exception message.
AI-Powered Analysis
Technical Analysis
CVE-2024-23689 is a vulnerability classified under CWE-209, involving the generation of error messages that contain sensitive information. It affects multiple ClickHouse client implementations: clickhouse-r2dbc, clickhouse-jdbc, and clickhouse-client, specifically versions earlier than 0.4.6. The flaw arises when these clients are configured to use SSL client certificates with a password-protected private key ('sslkey' parameter). If an exception occurs during database operations—such as a ClickHouseException or SQLException—the exception message logged includes the client certificate password in plaintext. This leakage occurs because the exception handling code inadvertently incorporates sensitive credential data into error messages. The vulnerability is remotely exploitable (AV:N), requires low privileges (PR:L), and no user interaction (UI:N), with an unchanged scope (S:U). The impact is severe, compromising confidentiality (C:H), integrity (I:H), and availability (A:H) of the system. Although no known exploits are reported in the wild yet, the high CVSS score (8.8) reflects the critical nature of the exposure. This vulnerability can lead to unauthorized access to client certificate passwords, potentially enabling attackers to impersonate legitimate clients or decrypt SSL traffic, severely undermining security.
Potential Impact
For European organizations, the exposure of client certificate passwords can have significant consequences. Many enterprises and public sector entities rely on ClickHouse for analytics and data warehousing, often transmitting sensitive or regulated data over SSL connections. If attackers gain access to these passwords via logs, they could impersonate clients, intercept or manipulate data, or disrupt services. This compromises data confidentiality, integrity, and availability, potentially violating GDPR and other data protection regulations. The breach of client certificates could also facilitate lateral movement within networks or enable further attacks on critical infrastructure. The impact is particularly acute for sectors handling sensitive personal data, financial information, or critical infrastructure telemetry, making remediation urgent to avoid regulatory penalties and operational disruptions.
Mitigation Recommendations
The primary mitigation is to upgrade all affected ClickHouse client libraries (clickhouse-r2dbc, clickhouse-jdbc, clickhouse-client) to version 0.4.6 or later, where this vulnerability is fixed. Organizations should audit their usage of SSL client certificates and avoid logging sensitive information in exception messages. Implement strict logging policies that sanitize or redact sensitive data before writing to logs. Additionally, restrict access to logs to authorized personnel only and monitor logs for any suspicious access patterns. Employ network segmentation and strong access controls to limit exposure if credentials are compromised. Regularly review exception handling code in custom integrations to ensure no sensitive data is exposed. Finally, consider rotating client certificate passwords and associated keys if exposure is suspected.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2024-01-19T17:35:14.200Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6839c41d182aa0cae2b43612
Added to database: 5/30/2025, 2:43:41 PM
Last enriched: 11/29/2025, 4:06:55 AM
Last updated: 11/30/2025, 6:15:23 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66433: CWE-863 Incorrect Authorization in wisc HTCondor
MediumCVE-2025-66432: CWE-420 Unprotected Alternate Channel in Oxide Omicron
MediumCVE-2025-13782: SQL Injection in taosir WTCMS
MediumCVE-2025-66424: CWE-863 Incorrect Authorization in Tryton trytond
MediumCVE-2025-66423: CWE-863 Incorrect Authorization in Tryton trytond
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.