![](/assets/img/cve_300x82_sin_bg.png)
CVE-2019-15024
https://notcve.org/view.php?id=CVE-2019-15024
30 Dec 2019 — In all versions of ClickHouse before 19.14.3, an attacker having write access to ZooKeeper and who is able to run a custom server available from the network where ClickHouse runs, can create a custom-built malicious server that will act as a ClickHouse replica and register it in ZooKeeper. When another replica will fetch data part from the malicious replica, it can force clickhouse-server to write to arbitrary path on filesystem. En todas las versiones de ClickHouse anteriores a la versión 19.14.3, un ataca... • https://clickhouse.yandex/docs/en/security_changelog •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2019-16535
https://notcve.org/view.php?id=CVE-2019-16535
30 Dec 2019 — In all versions of ClickHouse before 19.14, an OOB read, OOB write and integer underflow in decompression algorithms can be used to achieve RCE or DoS via native protocol. En todas las versiones de ClickHouse anteriores a la versión 19.14, una lectura OOB, escritura OOB y un desbordamiento de enteros en algoritmos de descompresión pueden ser usados para lograr una RCE o DoS por medio del protocolo nativo. • https://clickhouse.yandex/docs/en/security_changelog • CWE-125: Out-of-bounds Read CWE-191: Integer Underflow (Wrap or Wraparound) CWE-787: Out-of-bounds Write •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2019-18657
https://notcve.org/view.php?id=CVE-2019-18657
31 Oct 2019 — ClickHouse before 19.13.5.44 allows HTTP header injection via the url table function. ClickHouse versiones anteriores a 19.13.5.44, permite una inyección de encabezado HTTP por medio de la función url table. • https://github.com/ClickHouse/ClickHouse/blob/master/CHANGELOG.md • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-14672
https://notcve.org/view.php?id=CVE-2018-14672
15 Aug 2019 — In ClickHouse before 18.12.13, functions for loading CatBoost models allowed path traversal and reading arbitrary files through error messages. En ClickHouse versiones anteriores a 18.12.13, las funciones para cargar modelos CatBoost permitían el salto de ruta (path) y la lectura de archivos arbitrarios por medio de mensajes de error. • https://clickhouse.yandex/docs/en/security_changelog • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-14671
https://notcve.org/view.php?id=CVE-2018-14671
15 Aug 2019 — In ClickHouse before 18.10.3, unixODBC allowed loading arbitrary shared objects from the file system which led to a Remote Code Execution vulnerability. En ClickHouse versiones anteriores a 18.10.3, unixODBC permitía cargar objetos compartidos arbitrarios desde el sistema de archivos, lo que conlleva a una vulnerabilidad de Ejecución de Código Remota. • https://clickhouse.yandex/docs/en/security_changelog • CWE-20: Improper Input Validation •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-14669
https://notcve.org/view.php?id=CVE-2018-14669
15 Aug 2019 — ClickHouse MySQL client before versions 1.1.54390 had "LOAD DATA LOCAL INFILE" functionality enabled that allowed a malicious MySQL database read arbitrary files from the connected ClickHouse server. El cliente ClickHouse MySQL versiones anteriores a 1.1.54390, tenía habilitada la funcionalidad "LOAD DATA LOCAL INFILE" que permitía a una base de datos MySQL maliciosa leer archivos arbitrarios desde el servidor ClickHouse conectado. • https://clickhouse.yandex/docs/en/security_changelog • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-14668
https://notcve.org/view.php?id=CVE-2018-14668
15 Aug 2019 — In ClickHouse before 1.1.54388, "remote" table function allowed arbitrary symbols in "user", "password" and "default_database" fields which led to Cross Protocol Request Forgery Attacks. En ClickHouse versiones anteriores a 1.1.54388, la función de tabla "remote" permitía símbolos arbitrarios en los campos "user", "password" y "default_database" que conllevan a ataques de tipo Cross Protocol Request Forgery. • https://clickhouse.yandex/docs/en/security_changelog • CWE-352: Cross-Site Request Forgery (CSRF) •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-14670
https://notcve.org/view.php?id=CVE-2018-14670
15 Aug 2019 — Incorrect configuration in deb package in ClickHouse before 1.1.54131 could lead to unauthorized use of the database. Una configuración incorrecta en el paquete deb en ClickHouse versiones anteriores a 1.1.54131, podría conllevar a un uso no autorizado de la base de datos. • https://clickhouse.yandex/docs/en/security_changelog • CWE-285: Improper Authorization •