ch-go Query Smuggling Vulnerability

MEDIUM (4.9) No Patch (252 days)

Threat Intelligence

Low Risk
EPSS Score: 0.01% chance of exploitation (percentile: 2%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

The ch-go library is a Go package used for connecting to ClickHouse databases. It allows users to execute queries on the database server. The vulnerability in question occurs when an attacker can smuggle another query packet into the connection stream by sending large, uncompressed malicious external data.

Am I affected?

You're affected if you use When using the ch-go. Specific version info not stated in the advisory. If you don't recognise this software, you're probably not affected.

Affected Packages

go: github.com/ClickHouse/ch-go

How to fix

Update to at least version 0.65.0:
* Go to the ClickHouse GitHub page and download the latest version.
* Run go get github.com/ClickHouse/ch-go@v0.65.0 in your terminal.

Immediate mitigations:
- Restrict network access to your ch-go instance (firewall it from the public internet)
- Audit query logs for suspicious patterns
- Monitor for unauthorized query execution

References