#VU30822 Path traversal in ClickHouse - CVE-2018-14672


| Updated: 2020-07-17

Vulnerability identifier: #VU30822

Vulnerability risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-14672

CWE-ID: CWE-22

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
ClickHouse
Other software / Other software solutions

Vendor: ClickHouse

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

In ClickHouse before 18.12.13, functions for loading CatBoost models allowed path traversal and reading arbitrary files through error messages.

Mitigation
Install update from vendor's website.

Vulnerable software versions

ClickHouse: 18.12.0 - 18.12.12


External links
https://clickhouse.yandex/docs/en/security_changelog/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability