Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AI PRP: clickhouse exposed API with weak/default credentials #464

Open
lanced00m opened this issue Apr 11, 2024 · 2 comments
Open

AI PRP: clickhouse exposed API with weak/default credentials #464

lanced00m opened this issue Apr 11, 2024 · 2 comments
Labels
ai-bounty-prp Identify an AI bounty plugin

Comments

@lanced00m
Copy link
Contributor

lanced00m commented Apr 11, 2024

one of the main use cases of Clickhouse is in Machine Learning & GenAI.
the default username and password exist for clickhouse especially when you set it up with docker containers.

docker hub: https://hub.docker.com/r/clickhouse/clickhouse-server/
documentation: https://clickhouse.com/docs/en/install#from-docker-image
GitHub repository: https://github.com/ClickHouse/ClickHouse

Also, there is a simple UI that is part of the main API:
image

@lanced00m lanced00m changed the title AI PRP: clickhouse exposed UI with weak/default credentials AI PRP: clickhouse exposed API with weak/default credentials Apr 11, 2024
@maoning
Copy link
Collaborator

maoning commented Apr 18, 2024

@lanced00m does the clickhouse API supports arbitrary command execution or just SQL cmds?

@maoning maoning added the ai-bounty-prp Identify an AI bounty plugin label Apr 18, 2024
@lanced00m
Copy link
Contributor Author

@maoning I didn't find a way to execute an OS command with the help of SQL cmds. but it is still a critical bug.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
ai-bounty-prp Identify an AI bounty plugin
Projects
None yet
Development

No branches or pull requests

2 participants