CVE-2024-23689: ClickHouse Client Certificate Password Exposure

Description

Exposure of sensitive information in exceptions in ClichHouse's clickhouse-r2dbc, com.clickhouse:clickhouse-jdbc, and com.clickhouse:clickhouse-client versions less than 0.4.6 allows unauthorized users to gain access to client certificate passwords via client exception logs. This occurs when 'sslkey' is specified and an exception, such as a ClickHouseException or SQLException, is thrown during database operations; the certificate password is then included in the logged exception message.

Classification

CVE ID: CVE-2024-23689

Problem Types

CWE-209 Generation of Error Message Containing Sensitive Information

Affected Products

Vendor:

Product:

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.71% (probability of being exploited)

EPSS Percentile: 71.18% (scored less or equal to compared to others)

EPSS Date: 2025-06-08 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: poc

SSVC Technical Impact: total

SSVC Automatable: false

References

https://nvd.nist.gov/vuln/detail/CVE-2024-23689
https://github.com/ClickHouse/clickhouse-java/security/advisories/GHSA-g8ph-74m6-8m7r
https://github.com/ClickHouse/clickhouse-java/issues/1331
https://github.com/ClickHouse/clickhouse-java/pull/1334
https://github.com/ClickHouse/clickhouse-java/releases/tag/v0.4.6
https://github.com/advisories/GHSA-g8ph-74m6-8m7r
https://vulncheck.com/advisories/vc-advisory-GHSA-g8ph-74m6-8m7r

Timeline