mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-30 18:04:30 +00:00
97 lines
4.0 KiB
JSON
97 lines
4.0 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2025-1385",
|
|
"ASSIGNER": "security@clickhouse.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "When the library bridge feature is enabled, the clickhouse-library-bridge exposes an HTTP API on localhost. This allows clickhouse-server to dynamically load a library from a specified path and execute it in an isolated process. Combined with the ClickHouse table engine functionality that permits file uploads to specific directories, a misconfigured server can be exploited by an attacker with privilege to access to both table engines to execute arbitrary code on the ClickHouse server.\n\nYou can check if your ClickHouse server is vulnerable to this vulnerability by inspecting the configuration file and confirming if the following setting is enabled:\n\n<library_bridge>\n <port>9019</port>\n</library_bridge>"
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-20 Improper Input Validation",
|
|
"cweId": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "ClickHouse",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "ClickHouse OSS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "24.3",
|
|
"version_value": "24.3.18.6"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "24.8",
|
|
"version_value": "24.8.14.27"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "24.11",
|
|
"version_value": "24.11.5.34"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "24.12",
|
|
"version_value": "24.12.5.65"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "25.1",
|
|
"version_value": "25.1.5.5"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-5phv-x8x4-83x5",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-5phv-x8x4-83x5"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.2.0"
|
|
},
|
|
"source": {
|
|
"discovery": "UNKNOWN"
|
|
},
|
|
"credits": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Arseniy Dugin"
|
|
}
|
|
]
|
|
} |