{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-1386","assignerOrgId":"cb7ba516-3b07-4c98-b0c2-715220f1a8f6","state":"PUBLISHED","assignerShortName":"ClickHouse","dateReserved":"2025-02-17T02:21:07.315Z","datePublished":"2025-04-11T04:27:35.846Z","dateUpdated":"2025-04-11T16:01:28.660Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://github.com/ClickHouse/ch-go","defaultStatus":"unaffected","packageName":"ch-go","product":"ch-go","repo":"https://github.com/ClickHouse/ch-go","vendor":"ch-go","versions":[{"lessThan":"0.65.0","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"lixts"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">When using the ch-go library, under a specific condition when the query includes a large, uncompressed malicious external data, it is possible for an attacker in control of such data to smuggle another query packet into the connection stream.</span><br>"}],"value":"When using the ch-go library, under a specific condition when the query includes a large, uncompressed malicious external data, it is possible for an attacker in control of such data to smuggle another query packet into the connection stream."}],"impacts":[{"capecId":"CAPEC-66","descriptions":[{"lang":"en","value":"CAPEC-66 SQL Injection"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"HIGH","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":5.9,"baseSeverity":"MEDIUM","privilegesRequired":"HIGH","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"description":"Query smuggling","lang":"en"}]}],"providerMetadata":{"orgId":"cb7ba516-3b07-4c98-b0c2-715220f1a8f6","shortName":"ClickHouse","dateUpdated":"2025-04-11T04:34:41.036Z"},"references":[{"url":"https://github.com/ClickHouse/ch-go/security/advisories/GHSA-m454-3xv7-qj85"}],"source":{"discovery":"UNKNOWN"},"title":"Query smuggling in ch-go library","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-444","lang":"en","description":"CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-11T14:48:34.359780Z","id":"CVE-2025-1386","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-11T16:01:28.660Z"}}]}}