Miggo Logo

CVE-2023-34230: Snowflake Connector .Net Command Injection

7.3

CVSS Score
3.1

Basic Information

EPSS Score
0.83601%
Published
6/9/2023
Updated
11/6/2023
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
Snowflake.Datanuget< 2.0.182.0.18

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability involves command injection through SSO URL processing. The attack vector requires executing commands via crafted URLs, which strongly suggests the authentication flow contains a function that: 1) Handles SSO URL input, 2) Uses that input in command execution contexts. The RequestPostAuthCodeViaBrowser method is a prime candidate as it would be responsible for launching browser-based authentication and would need to handle URL parameters. The .NET driver's browser launch mechanism (using Process.Start) with untrusted URL input would explain the command injection vector. While exact code isn't available, the CWE-77 classification and attack scenario alignment make this a high-confidence assessment.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Issu* Snow*l*k* w*s in*orm** vi* our *u* *ounty pro*r*m o* * *omm*n* inj**tion vuln*r**ility in t** Snow*l*k* .N*T *riv*r vi* SSO URL *ut**nti**tion. ### Imp**t** *riv*r p**k***: snow*l*k*-*onn**tor-n*t ### Imp**t** v*rsion r*n**: ***or* [V*r

Reasoning

T** vuln*r**ility involv*s *omm*n* inj**tion t*rou** SSO URL pro**ssin*. T** *tt**k v**tor r*quir*s *x**utin* *omm*n*s vi* *r**t** URLs, w*i** stron*ly su***sts t** *ut**nti**tion *low *ont*ins * *un*tion t**t: *) **n*l*s SSO URL input, *) Us*s t**t