Clickhouse vulnerabilities
24 known vulnerabilities affecting clickhouse/clickhouse.
Total CVEs
24
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL4HIGH12MEDIUM8
Vulnerabilities
Page 1 of 2
CVE-2019-16536HIGHCVSS 8.2fixed in 19.14.3.32025-05-21
CVE-2019-16536 [HIGH] CWE-120 CVE-2019-16536: Stack overflow leading to DoS can be triggered by a malicious authenticated client in Clickhouse bef
Stack overflow leading to DoS can be triggered by a malicious authenticated client in Clickhouse before 19.14.3.3.
nvd
CVE-2024-41436HIGHCVSS 7.5v24.3.3.1022024-09-03
CVE-2024-41436 [HIGH] CWE-120 CVE-2024-41436: ClickHouse v24.3.3.102 was discovered to contain a buffer overflow via the component DB::evaluateCon
ClickHouse v24.3.3.102 was discovered to contain a buffer overflow via the component DB::evaluateConstantExpressionImpl.
nvd
CVE-2024-6873HIGHCVSS 8.1≥ v23.8.0, < v23.8.15.35-lts≥ v24.3.0, < v24.3.4.147-lts+3 more2024-08-01
CVE-2024-6873 [HIGH] CWE-122 CVE-2024-6873: It is possible to crash or redirect the execution flow of the ClickHouse server process from an unau
It is possible to crash or redirect the execution flow of the ClickHouse server process from an unauthenticated vector by sending a specially crafted request to the ClickHouse server native interface. This redirection is limited to what is available within a 256-byte range of memory at the time of execution, and no known remote code execution (RCE) code
nvd
CVE-2024-22412MEDIUMCVSS 4.9≥ 23.3.0.0, < 23.3.22.3≥ 23.8.0.0, < 23.8.12.13+4 more2024-03-18
CVE-2024-22412 [MEDIUM] CWE-863 CVE-2024-22412: ClickHouse is an open-source column-oriented database management system. A bug exists in the cloud C
ClickHouse is an open-source column-oriented database management system. A bug exists in the cloud ClickHouse offering prior to version 24.0.2.54535 and in github.com/clickhouse/clickhouse version 23.1. Query caching bypasses the role based access controls and the policies being enforced on roles. In affected versions, the query cache only respects
nvd
CVE-2023-48704HIGHCVSS 7.5≥ 23.3, < 23.3.18.15≥ 23.8, < 23.8.8.20+7 more2023-12-22
CVE-2023-48704 [HIGH] CWE-120 CVE-2023-48704: ClickHouse is an open-source column-oriented database management system that allows generating analy
ClickHouse is an open-source column-oriented database management system that allows generating analytical data reports in real-time. A heap buffer overflow issue was discovered in ClickHouse server. An attacker could send a specially crafted payload to the native interface exposed by default on port 9000/tcp, triggering a bug in the decompression logi
nvd
CVE-2023-48298HIGHCVSS 7.5≥ 23.3, ≤ 23.3.17.13≥ 23.8, ≤ 23.8.7.24+2 more2023-12-21
CVE-2023-48298 [HIGH] CVE-2023-48298: ClickHouse® is an open-source column-oriented database management system that allows generating anal
ClickHouse® is an open-source column-oriented database management system that allows generating analytical data reports in real-time. This vulnerability is an integer underflow resulting in crash due to stack buffer overflow in decompression of FPC codec. It can be triggered and exploited by an unauthenticated attacker. The vulnerability is very similar to CV
nvd
CVE-2023-47118CRITICALCVSS 9.8≥ 23.3, < 23.3.16.7≥ 23.8, < 23.8.6.16+3 more2023-12-20
CVE-2023-47118 [CRITICAL] CWE-122 CVE-2023-47118: ClickHouse® is an open-source column-oriented database management system that allows generating anal
ClickHouse® is an open-source column-oriented database management system that allows generating analytical data reports in real-time. A heap buffer overflow issue was discovered in ClickHouse server. An attacker could send a specially crafted payload to the native interface exposed by default on port 9000/tcp, triggering a bug in the decompression
nvd
CVE-2022-44010HIGHCVSS 7.5fixed in 22.3.12.19≥ 22.6, < 22.6.6.16+3 more2023-11-23
CVE-2022-44010 [HIGH] CWE-787 CVE-2022-44010: An issue was discovered in ClickHouse before 22.9.1.2603. An attacker could send a crafted HTTP requ
An issue was discovered in ClickHouse before 22.9.1.2603. An attacker could send a crafted HTTP request to the HTTP Endpoint (usually listening on port 8123 by default), causing a heap-based buffer overflow that crashes the process. This does not require authentication. The fixed versions are 22.9.1.2603, 22.8.2.11, 22.7.4.16, 22.6.6.16, and 22.3.12.1
nvd
CVE-2022-44011MEDIUMCVSS 6.5fixed in 22.3.12.19≥ 22.6, < 22.6.6.16+3 more2023-11-23
CVE-2022-44011 [MEDIUM] CWE-787 CVE-2022-44011: An issue was discovered in ClickHouse before 22.9.1.2603. An authenticated user (with the ability to
An issue was discovered in ClickHouse before 22.9.1.2603. An authenticated user (with the ability to load data) could cause a heap buffer overflow and crash the server by inserting a malformed CapnProto object. The fixed versions are 22.9.1.2603, 22.8.2.11, 22.7.4.16, 22.6.6.16, and 22.3.12.19.
nvd
CVE-2021-43304HIGHCVSS 8.8fixed in 21.10.2.152022-03-14
CVE-2021-43304 [HIGH] CWE-122 CVE-2021-43304: Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is
Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the LZ4::decompressImpl loop and especially the arbitrary copy operation wildCopy(op, ip, copy_end), don’t exceed the destination buffer’s limits.
nvdosv
CVE-2021-42388HIGHCVSS 8.1fixed in 21.10.2.152022-03-14
CVE-2021-42388 [HIGH] CWE-125 CVE-2021-42388: Heap out-of-bounds read in Clickhouse's LZ4 compression codec when parsing a malicious query. As par
Heap out-of-bounds read in Clickhouse's LZ4 compression codec when parsing a malicious query. As part of the LZ4::decompressImpl() loop, a 16-bit unsigned user-supplied value ('offset') is read from the compressed data. The offset is later used in the length of a copy operation, without checking the lower bounds of the source of the copy operation.
nvdosv
CVE-2021-42387HIGHCVSS 8.1fixed in 21.10.2.152022-03-14
CVE-2021-42387 [HIGH] CWE-125 CVE-2021-42387: Heap out-of-bounds read in Clickhouse's LZ4 compression codec when parsing a malicious query. As par
Heap out-of-bounds read in Clickhouse's LZ4 compression codec when parsing a malicious query. As part of the LZ4::decompressImpl() loop, a 16-bit unsigned user-supplied value ('offset') is read from the compressed data. The offset is later used in the length of a copy operation, without checking the upper bounds of the source of the copy operation.
nvdosv
CVE-2021-43305HIGHCVSS 8.8fixed in 21.10.2.152022-03-14
CVE-2021-43305 [HIGH] CVE-2021-43305: Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is
Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the LZ4::decompressImpl loop and especially the arbitrary copy operation wildCopy(op, ip, copy_end), don’t exceed the destination buffer’s limits. This issue is very similar to CVE-2021-43304, but the vulnerable copy o
nvdosv
CVE-2021-42391MEDIUMCVSS 6.5fixed in 21.10.2.152022-03-14
CVE-2021-42391 [MEDIUM] CWE-369 CVE-2021-42391: Divide-by-zero in Clickhouse's Gorilla compression codec when parsing a malicious query. The first b
Divide-by-zero in Clickhouse's Gorilla compression codec when parsing a malicious query. The first byte of the compressed buffer is used in a modulo operation without being checked for 0.
nvd
CVE-2021-42389MEDIUMCVSS 6.5fixed in 21.10.2.152022-03-14
CVE-2021-42389 [MEDIUM] CWE-369 CVE-2021-42389: Divide-by-zero in Clickhouse's Delta compression codec when parsing a malicious query. The first byt
Divide-by-zero in Clickhouse's Delta compression codec when parsing a malicious query. The first byte of the compressed buffer is used in a modulo operation without being checked for 0.
nvd
CVE-2021-42390MEDIUMCVSS 6.5fixed in 21.10.2.152022-03-14
CVE-2021-42390 [MEDIUM] CWE-369 CVE-2021-42390: Divide-by-zero in Clickhouse's DeltaDouble compression codec when parsing a malicious query. The fir
Divide-by-zero in Clickhouse's DeltaDouble compression codec when parsing a malicious query. The first byte of the compressed buffer is used in a modulo operation without being checked for 0.
nvd
CVE-2019-16535CRITICALCVSS 9.8fixed in 19.14vAll versions prior to version 19.14.2019-12-30
CVE-2019-16535 [CRITICAL] CWE-125 CVE-2019-16535: In all versions of ClickHouse before 19.14, an OOB read, OOB write and integer underflow in decompre
In all versions of ClickHouse before 19.14, an OOB read, OOB write and integer underflow in decompression algorithms can be used to achieve RCE or DoS via native protocol.
nvd
CVE-2019-15024MEDIUMCVSS 6.5fixed in 19.14.3vAll versions prior to version 19.14.3.2019-12-30
CVE-2019-15024 [MEDIUM] CVE-2019-15024: In all versions of ClickHouse before 19.14.3, an attacker having write access to ZooKeeper and who i
In all versions of ClickHouse before 19.14.3, an attacker having write access to ZooKeeper and who is able to run a custom server available from the network where ClickHouse runs, can create a custom-built malicious server that will act as a ClickHouse replica and register it in ZooKeeper. When another replica will fetch data part from the malicious replica
nvd
CVE-2019-18657MEDIUMCVSS 5.3fixed in 19.13.5.442019-10-31
CVE-2019-18657 [MEDIUM] CWE-74 CVE-2019-18657: ClickHouse before 19.13.5.44 allows HTTP header injection via the url table function.
ClickHouse before 19.13.5.44 allows HTTP header injection via the url table function.
nvd
CVE-2018-14671CRITICALCVSS 9.8fixed in 18.10.3vAll versions prior to version 18.10.3.2019-08-15
CVE-2018-14671 [CRITICAL] CWE-20 CVE-2018-14671: In ClickHouse before 18.10.3, unixODBC allowed loading arbitrary shared objects from the file system
In ClickHouse before 18.10.3, unixODBC allowed loading arbitrary shared objects from the file system which led to a Remote Code Execution vulnerability.
nvdosv
1 / 2Next →