Arbitrary Command Injection Affecting snowflake.data package, versions [,2.0.18)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.22% (61st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DOTNET-SNOWFLAKEDATA-5673230
  • published9 Jun 2023
  • disclosed9 Jun 2023
  • creditUnknown

Introduced: 9 Jun 2023

CVE-2023-34230  (opens in a new tab)
CWE-77  (opens in a new tab)

How to fix?

Upgrade Snowflake.Data to version 2.0.18 or higher.

Overview

Affected versions of this package are vulnerable to Arbitrary Command Injection via single sign-on (SSO) browser URL authentication. In order to exploit the potential for command injection, an attacker would need to be successful in (1) establishing a malicious resource and (2) redirecting users to utilize the resource. The attacker could set up a malicious, publicly accessible server which responds to the SSO URL with an attack payload. If the attacker then tricked a user into visiting the maliciously crafted connection URL, the user’s local machine would render the malicious payload, leading to a remote code execution.

Mitigation:

This attack scenario can be mitigated through URL whitelisting as well as common anti-phishing resources.

CVSS Scores

version 3.1