Description
In all versions of ClickHouse before 19.14.3, an attacker having write access to ZooKeeper and who is able to run a custom server available from the network where ClickHouse runs, can create a custom-built malicious server that will act as a ClickHouse replica and register it in ZooKeeper. When another replica will fetch data part from the malicious replica, it can force clickhouse-server to write to arbitrary path on filesystem.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-6111 | In all versions of ClickHouse before 19.14.3, an attacker having write access to ZooKeeper and who is able to run a custom server available from the network where ClickHouse runs, can create a custom-built malicious server that will act as a ClickHouse replica and register it in ZooKeeper. When another replica will fetch data part from the malicious replica, it can force clickhouse-server to write to arbitrary path on filesystem. |
References
| Link | Providers |
|---|---|
| https://clickhouse.yandex/docs/en/security_changelog/ |
|
History
Wed, 25 Jun 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Clickhouse
Clickhouse clickhouse |
|
| CPEs | cpe:2.3:a:clickhouse:clickhouse:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Yandex
Yandex clickhouse |
Clickhouse
Clickhouse clickhouse |
Status: PUBLISHED
Assigner: yandex
Published:
Updated: 2024-08-05T00:34:53.024Z
Reserved: 2019-08-13T00:00:00.000Z
Link: CVE-2019-15024
No data.
Status : Modified
Published: 2019-12-30T15:15:10.580
Modified: 2025-06-25T20:48:54.637
Link: CVE-2019-15024
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD