Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23689: CWE-209 Generation of Error Message Containing Sensitive Information

0
High
VulnerabilityCVE-2024-23689cvecve-2024-23689cwe-209
Published: Fri Jan 19 2024 (01/19/2024, 21:02:29 UTC)
Source: CVE Database V5

Description

Exposure of sensitive information in exceptions in ClichHouse's clickhouse-r2dbc, com.clickhouse:clickhouse-jdbc, and com.clickhouse:clickhouse-client versions less than 0.4.6 allows unauthorized users to gain access to client certificate passwords via client exception logs. This occurs when 'sslkey' is specified and an exception, such as a ClickHouseException or SQLException, is thrown during database operations; the certificate password is then included in the logged exception message.

AI-Powered Analysis

AILast updated: 11/29/2025, 04:06:55 UTC

Technical Analysis

CVE-2024-23689 is a vulnerability classified under CWE-209, involving the generation of error messages that contain sensitive information. It affects multiple ClickHouse client implementations: clickhouse-r2dbc, clickhouse-jdbc, and clickhouse-client, specifically versions earlier than 0.4.6. The flaw arises when these clients are configured to use SSL client certificates with a password-protected private key ('sslkey' parameter). If an exception occurs during database operations—such as a ClickHouseException or SQLException—the exception message logged includes the client certificate password in plaintext. This leakage occurs because the exception handling code inadvertently incorporates sensitive credential data into error messages. The vulnerability is remotely exploitable (AV:N), requires low privileges (PR:L), and no user interaction (UI:N), with an unchanged scope (S:U). The impact is severe, compromising confidentiality (C:H), integrity (I:H), and availability (A:H) of the system. Although no known exploits are reported in the wild yet, the high CVSS score (8.8) reflects the critical nature of the exposure. This vulnerability can lead to unauthorized access to client certificate passwords, potentially enabling attackers to impersonate legitimate clients or decrypt SSL traffic, severely undermining security.

Potential Impact

For European organizations, the exposure of client certificate passwords can have significant consequences. Many enterprises and public sector entities rely on ClickHouse for analytics and data warehousing, often transmitting sensitive or regulated data over SSL connections. If attackers gain access to these passwords via logs, they could impersonate clients, intercept or manipulate data, or disrupt services. This compromises data confidentiality, integrity, and availability, potentially violating GDPR and other data protection regulations. The breach of client certificates could also facilitate lateral movement within networks or enable further attacks on critical infrastructure. The impact is particularly acute for sectors handling sensitive personal data, financial information, or critical infrastructure telemetry, making remediation urgent to avoid regulatory penalties and operational disruptions.

Mitigation Recommendations

The primary mitigation is to upgrade all affected ClickHouse client libraries (clickhouse-r2dbc, clickhouse-jdbc, clickhouse-client) to version 0.4.6 or later, where this vulnerability is fixed. Organizations should audit their usage of SSL client certificates and avoid logging sensitive information in exception messages. Implement strict logging policies that sanitize or redact sensitive data before writing to logs. Additionally, restrict access to logs to authorized personnel only and monitor logs for any suspicious access patterns. Employ network segmentation and strong access controls to limit exposure if credentials are compromised. Regularly review exception handling code in custom integrations to ensure no sensitive data is exposed. Finally, consider rotating client certificate passwords and associated keys if exposure is suspected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2024-01-19T17:35:14.200Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c41d182aa0cae2b43612

Added to database: 5/30/2025, 2:43:41 PM

Last enriched: 11/29/2025, 4:06:55 AM

Last updated: 11/30/2025, 6:15:23 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats