Page 2 of 18 results (0.012 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

30 Dec 2019 — In all versions of ClickHouse before 19.14.3, an attacker having write access to ZooKeeper and who is able to run a custom server available from the network where ClickHouse runs, can create a custom-built malicious server that will act as a ClickHouse replica and register it in ZooKeeper. When another replica will fetch data part from the malicious replica, it can force clickhouse-server to write to arbitrary path on filesystem. En todas las versiones de ClickHouse anteriores a la versión 19.14.3, un ataca... • https://clickhouse.yandex/docs/en/security_changelog •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

30 Dec 2019 — In all versions of ClickHouse before 19.14, an OOB read, OOB write and integer underflow in decompression algorithms can be used to achieve RCE or DoS via native protocol. En todas las versiones de ClickHouse anteriores a la versión 19.14, una lectura OOB, escritura OOB y un desbordamiento de enteros en algoritmos de descompresión pueden ser usados para lograr una RCE o DoS por medio del protocolo nativo. • https://clickhouse.yandex/docs/en/security_changelog • CWE-125: Out-of-bounds Read CWE-191: Integer Underflow (Wrap or Wraparound) CWE-787: Out-of-bounds Write •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

31 Oct 2019 — ClickHouse before 19.13.5.44 allows HTTP header injection via the url table function. ClickHouse versiones anteriores a 19.13.5.44, permite una inyección de encabezado HTTP por medio de la función url table. • https://github.com/ClickHouse/ClickHouse/blob/master/CHANGELOG.md • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

15 Aug 2019 — In ClickHouse before 18.12.13, functions for loading CatBoost models allowed path traversal and reading arbitrary files through error messages. En ClickHouse versiones anteriores a 18.12.13, las funciones para cargar modelos CatBoost permitían el salto de ruta (path) y la lectura de archivos arbitrarios por medio de mensajes de error. • https://clickhouse.yandex/docs/en/security_changelog • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

15 Aug 2019 — In ClickHouse before 18.10.3, unixODBC allowed loading arbitrary shared objects from the file system which led to a Remote Code Execution vulnerability. En ClickHouse versiones anteriores a 18.10.3, unixODBC permitía cargar objetos compartidos arbitrarios desde el sistema de archivos, lo que conlleva a una vulnerabilidad de Ejecución de Código Remota. • https://clickhouse.yandex/docs/en/security_changelog • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

15 Aug 2019 — ClickHouse MySQL client before versions 1.1.54390 had "LOAD DATA LOCAL INFILE" functionality enabled that allowed a malicious MySQL database read arbitrary files from the connected ClickHouse server. El cliente ClickHouse MySQL versiones anteriores a 1.1.54390, tenía habilitada la funcionalidad "LOAD DATA LOCAL INFILE" que permitía a una base de datos MySQL maliciosa leer archivos arbitrarios desde el servidor ClickHouse conectado. • https://clickhouse.yandex/docs/en/security_changelog • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

15 Aug 2019 — In ClickHouse before 1.1.54388, "remote" table function allowed arbitrary symbols in "user", "password" and "default_database" fields which led to Cross Protocol Request Forgery Attacks. En ClickHouse versiones anteriores a 1.1.54388, la función de tabla "remote" permitía símbolos arbitrarios en los campos "user", "password" y "default_database" que conllevan a ataques de tipo Cross Protocol Request Forgery. • https://clickhouse.yandex/docs/en/security_changelog • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

15 Aug 2019 — Incorrect configuration in deb package in ClickHouse before 1.1.54131 could lead to unauthorized use of the database. Una configuración incorrecta en el paquete deb en ClickHouse versiones anteriores a 1.1.54131, podría conllevar a un uso no autorizado de la base de datos. • https://clickhouse.yandex/docs/en/security_changelog • CWE-285: Improper Authorization •