Vulnerability Details CVE-2023-34231
gosnowflake is th Snowflake Golang driver. Prior to version 1.6.19, a command injection vulnerability exists in the Snowflake Golang driver via single sign-on (SSO) browser URL authentication. In order to exploit the potential for command injection, an attacker would need to be successful in (1) establishing a malicious resource and (2) redirecting users to utilize the resource. The attacker could set up a malicious, publicly accessible server which responds to the SSO URL with an attack payload. If the attacker then tricked a user into visiting the maliciously crafted connection URL, the user’s local machine would render the malicious payload, leading to a remote code execution. This attack scenario can be mitigated through URL whitelisting as well as common anti-phishing resources. A patch is available in version 1.6.19.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 67.3%
CVSS Severity
CVSS v3 Score 7.3
Products affected by CVE-2023-34231
-
cpe:2.3:a:snowflake:gosnowflake:0.1
-
cpe:2.3:a:snowflake:gosnowflake:0.2
-
cpe:2.3:a:snowflake:gosnowflake:0.3.0
-
cpe:2.3:a:snowflake:gosnowflake:0.4.0
-
cpe:2.3:a:snowflake:gosnowflake:0.5.0
-
cpe:2.3:a:snowflake:gosnowflake:1.0.0
-
cpe:2.3:a:snowflake:gosnowflake:1.1.0
-
cpe:2.3:a:snowflake:gosnowflake:1.1.1
-
cpe:2.3:a:snowflake:gosnowflake:1.1.10
-
cpe:2.3:a:snowflake:gosnowflake:1.1.11
-
cpe:2.3:a:snowflake:gosnowflake:1.1.12
-
cpe:2.3:a:snowflake:gosnowflake:1.1.13
-
cpe:2.3:a:snowflake:gosnowflake:1.1.14
-
cpe:2.3:a:snowflake:gosnowflake:1.1.15
-
cpe:2.3:a:snowflake:gosnowflake:1.1.16
-
cpe:2.3:a:snowflake:gosnowflake:1.1.17
-
cpe:2.3:a:snowflake:gosnowflake:1.1.18
-
cpe:2.3:a:snowflake:gosnowflake:1.1.19
-
cpe:2.3:a:snowflake:gosnowflake:1.1.2
-
cpe:2.3:a:snowflake:gosnowflake:1.1.3
-
cpe:2.3:a:snowflake:gosnowflake:1.1.4
-
cpe:2.3:a:snowflake:gosnowflake:1.1.5
-
cpe:2.3:a:snowflake:gosnowflake:1.1.6
-
cpe:2.3:a:snowflake:gosnowflake:1.1.7
-
cpe:2.3:a:snowflake:gosnowflake:1.1.8
-
cpe:2.3:a:snowflake:gosnowflake:1.1.9
-
cpe:2.3:a:snowflake:gosnowflake:1.2.0
-
cpe:2.3:a:snowflake:gosnowflake:1.3.0
-
cpe:2.3:a:snowflake:gosnowflake:1.3.1
-
cpe:2.3:a:snowflake:gosnowflake:1.3.10
-
cpe:2.3:a:snowflake:gosnowflake:1.3.11
-
cpe:2.3:a:snowflake:gosnowflake:1.3.12
-
cpe:2.3:a:snowflake:gosnowflake:1.3.13
-
cpe:2.3:a:snowflake:gosnowflake:1.3.2
-
cpe:2.3:a:snowflake:gosnowflake:1.3.3
-
cpe:2.3:a:snowflake:gosnowflake:1.3.4
-
cpe:2.3:a:snowflake:gosnowflake:1.3.5
-
cpe:2.3:a:snowflake:gosnowflake:1.3.6
-
cpe:2.3:a:snowflake:gosnowflake:1.3.7
-
cpe:2.3:a:snowflake:gosnowflake:1.3.8
-
cpe:2.3:a:snowflake:gosnowflake:1.3.9
-
cpe:2.3:a:snowflake:gosnowflake:1.4.0
-
cpe:2.3:a:snowflake:gosnowflake:1.4.1
-
cpe:2.3:a:snowflake:gosnowflake:1.4.2
-
cpe:2.3:a:snowflake:gosnowflake:1.4.3
-
cpe:2.3:a:snowflake:gosnowflake:1.5.0
-
cpe:2.3:a:snowflake:gosnowflake:1.5.1
-
cpe:2.3:a:snowflake:gosnowflake:1.6.0
-
cpe:2.3:a:snowflake:gosnowflake:1.6.1
-
cpe:2.3:a:snowflake:gosnowflake:1.6.10
-
cpe:2.3:a:snowflake:gosnowflake:1.6.11
-
cpe:2.3:a:snowflake:gosnowflake:1.6.12
-
cpe:2.3:a:snowflake:gosnowflake:1.6.13
-
cpe:2.3:a:snowflake:gosnowflake:1.6.14
-
cpe:2.3:a:snowflake:gosnowflake:1.6.15
-
cpe:2.3:a:snowflake:gosnowflake:1.6.16
-
cpe:2.3:a:snowflake:gosnowflake:1.6.17
-
cpe:2.3:a:snowflake:gosnowflake:1.6.18
-
cpe:2.3:a:snowflake:gosnowflake:1.6.2
-
cpe:2.3:a:snowflake:gosnowflake:1.6.3
-
cpe:2.3:a:snowflake:gosnowflake:1.6.4
-
cpe:2.3:a:snowflake:gosnowflake:1.6.5
-
cpe:2.3:a:snowflake:gosnowflake:1.6.6
-
cpe:2.3:a:snowflake:gosnowflake:1.6.7
-
cpe:2.3:a:snowflake:gosnowflake:1.6.8
-
cpe:2.3:a:snowflake:gosnowflake:1.6.9