Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1792 | gosnowflake is th Snowflake Golang driver. Prior to version 1.6.19, a command injection vulnerability exists in the Snowflake Golang driver via single sign-on (SSO) browser URL authentication. In order to exploit the potential for command injection, an attacker would need to be successful in (1) establishing a malicious resource and (2) redirecting users to utilize the resource. The attacker could set up a malicious, publicly accessible server which responds to the SSO URL with an attack payload. If the attacker then tricked a user into visiting the maliciously crafted connection URL, the user’s local machine would render the malicious payload, leading to a remote code execution. This attack scenario can be mitigated through URL whitelisting as well as common anti-phishing resources. A patch is available in version 1.6.19. |
Github GHSA |
GHSA-fwv2-65wh-2w8c | Snowflake Golang Driver vulnerable to Command Injection |
Mon, 06 Jan 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-01-06T19:45:43.259Z
Reserved: 2023-05-31T13:51:51.168Z
Link: CVE-2023-34231
Updated: 2024-08-02T16:01:54.231Z
Status : Modified
Published: 2023-06-08T20:15:09.483
Modified: 2024-11-21T08:06:49.207
Link: CVE-2023-34231
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA