#VU87204 Command Injection in gosnowflake - CVE-2023-34231


Vulnerability identifier: #VU87204

Vulnerability risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2023-34231

CWE-ID: CWE-77

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
gosnowflake
Universal components / Libraries / Programming Languages & Components

Vendor: Snowflake Computing (snowflakedb)

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists via single sign-on (SSO) browser URL authentication. A remote unauthenticated attacker can set up a malicious, publicly accessible server which responds to the SSO URL with an attack payload, trick the victim into visiting the maliciously crafted connection URL and execute arbitrary code on the target system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

gosnowflake: 0.1 - 1.6.18


External links
https://github.com/snm/snowflakedb/gom/snowflakedb/goowflakedb/gosnowflake/security/advisories/GHSA-fwv2-65wh-2w8c
https://github.com/snowflakedb/gosnowflake/commit/e11a2a555f1b9f7adc1f01fb7b5e7f38fbbb2a1c
https://github.com/snowflakedb/gosnowflake/pull/757


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability