Unauthorized Access Vulnerability in Clickhouse
Vulnerability Description
A malicious attacker can access the ClickHouse server without providing valid credentials. This may result in unauthorized access to sensitive data or allow the attacker to modify or delete data. By default, the clickhouse-server will monitor HTTP requests on port 8123 (this can be modified in the configuration).
Environment Setup
Vulnerability Reproduction
First, determine if the interface of the ClickHouse database is being used.
According to the documentation, a normal response is Ok. , and there is an X-ClickHouse-Summary
as a header in the response package.
Test if you can execute a SQL command, some will fail due to failed unauthenticated execution caused by identity verification.
Successfully execute the statement to obtain data, and execute other commands to detect the network.
You can view the execution record table in the system library to quickly locate the information that can be used (obtain sensitive user information, database names, and table names).
Last updated