When using the ch-go library, under a specific condition when the query includes a large, uncompressed malicious external data, it is possible for an attacker in control of such data to smuggle another query packet into the connection stream.
History

Fri, 11 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-444
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 11 Apr 2025 04:45:00 +0000

Type Values Removed Values Added
Description When using the ch-go library, under a specific condition when the query includes a large, uncompressed malicious external data, it is possible for an attacker in control of such data to smuggle another query packet into the connection stream.
Title Query smuggling in ch-go library
References
Metrics cvssV4_0

{'score': 5.9, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ClickHouse

Published: 2025-04-11T04:27:35.846Z

Updated: 2025-04-11T16:01:28.660Z

Reserved: 2025-02-17T02:21:07.315Z

Link: CVE-2025-1386

cve-icon Vulnrichment

Updated: 2025-04-11T15:09:36.694Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-11T05:15:29.583

Modified: 2025-04-11T16:15:19.490

Link: CVE-2025-1386

cve-icon Redhat

No data.