The vulnerability involves command injection through SSO URL processing. The attack vector requires executing commands via crafted URLs, which strongly suggests the authentication flow contains a function that: 1) Handles SSO URL input, 2) Uses that input in command execution contexts. The RequestPostAuthCodeViaBrowser method is a prime candidate as it would be responsible for launching browser-based authentication and would need to handle URL parameters. The .NET driver's browser launch mechanism (using Process.Start) with untrusted URL input would explain the command injection vector. While exact code isn't available, the CWE-77 classification and attack scenario alignment make this a high-confidence assessment.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| Snowflake.Data | nuget | < 2.0.18 | 2.0.18 |
Ongoing coverage of React2Shell