{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T10:25:04.527","vulnerabilities":[{"cve":{"id":"CVE-2023-48704","sourceIdentifier":"security-advisories@github.com","published":"2023-12-22T16:15:08.680","lastModified":"2024-11-21T08:32:17.700","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ClickHouse is an open-source column-oriented database management system that allows generating analytical data reports in real-time. A heap buffer overflow issue was discovered in ClickHouse server. An attacker could send a specially crafted payload to the native interface exposed by default on port 9000/tcp, triggering a bug in the decompression logic of Gorilla codec that crashes the ClickHouse server process. This attack does not require authentication. This issue has been addressed in ClickHouse Cloud version 23.9.2.47551 and ClickHouse versions 23.10.5.20, 23.3.18.15, 23.8.8.20, and 23.9.6.20."},{"lang":"es","value":"ClickHouse es un sistema de gestión de bases de datos orientado a columnas de código abierto que permite generar informes de datos analíticos en tiempo real. Se descubrió un problema de desbordamiento de búfer de almacenamiento dinámico en el servidor ClickHouse. Un atacante podría enviar un payload especialmente manipulado a la interfaz nativa expuesta de forma predeterminada en el puerto 9000/tcp, lo que desencadenaría un error en la lógica de descompresión del códec Gorilla que bloquearía el proceso del servidor ClickHouse. Este ataque no requiere autenticación. Este problema se solucionó en la versión 23.9.2.47551 de ClickHouse Cloud y en las versiones 23.10.5.20, 23.3.18.15, 23.8.8.20 y 23.9.6.20 de ClickHouse."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H","baseScore":7.0,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":4.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-120"},{"lang":"en","value":"CWE-122"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:clickhouse:clickhouse:*:*:*:*:*:*:*:*","versionStartIncluding":"23.3","versionEndExcluding":"23.3.18.15","matchCriteriaId":"D4F746FA-4DEB-4388-8AD1-A7601A950790"},{"vulnerable":true,"criteria":"cpe:2.3:a:clickhouse:clickhouse:*:*:*:*:*:*:*:*","versionStartIncluding":"23.8","versionEndExcluding":"23.8.8.20","matchCriteriaId":"F20B40F1-6CCC-47CF-AD9F-C7C9EDBBCF4C"},{"vulnerable":true,"criteria":"cpe:2.3:a:clickhouse:clickhouse:*:*:*:*:*:*:*:*","versionStartIncluding":"23.9","versionEndExcluding":"23.9.6.20","matchCriteriaId":"8D70CC6D-81AB-4240-8A87-6B85D868240F"},{"vulnerable":true,"criteria":"cpe:2.3:a:clickhouse:clickhouse:*:*:*:*:*:*:*:*","versionStartIncluding":"23.10","versionEndExcluding":"23.10.5.20","matchCriteriaId":"1B62252C-3C03-42F9-93B1-C5E8C772BD02"},{"vulnerable":true,"criteria":"cpe:2.3:a:clickhouse:clickhouse_cloud:*:*:*:*:*:*:*:*","versionEndExcluding":"23.9.2.47551","matchCriteriaId":"A26EA007-5F97-4407-881C-036BC0EB9487"}]}]}],"references":[{"url":"https://github.com/ClickHouse/ClickHouse/pull/57107","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-5rmf-5g48-xv63","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/ClickHouse/ClickHouse/pull/57107","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-5rmf-5g48-xv63","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}