Miggo Logo

CVE-2025-24788: Snowflake.Data has weak temporary files permissions

5

CVSS Score
3.1

Basic Information

EPSS Score
0.03883%
Published
1/29/2025
Updated
1/29/2025
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
Snowflake.Datanuget>= 2.0.12, <= 4.2.04.3.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from using default file creation methods (File.WriteAllText, File.Create, etc.) that inherited OS temporary directory permissions. The commit shows replacements with FileOperations.Instance.Create which adds Unix permission checks and restricts access. Key indicators include: 1) Test files modified to use secure writes, 2) Azure/S3 client downloads wrapped in permission-aware streams, 3) New FileOperations class enforcing 600-style permissions. Functions using raw file system access without permission controls in affected versions were vulnerable.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Issu* Snow*l*k* *is*ov*r** *n* r*m**i*t** * vuln*r**ility in t** Snow*l*k* *onn**tor *or .N*T in w*i** *il*s *ownlo**** *rom st***s *r* t*mpor*rily pl**** in * worl*-r*****l* lo**l *ir**tory, m*kin* t**m ****ssi*l* to un*ut*oriz** us*rs on t** s*

Reasoning

T** vuln*r**ility st*mm** *rom usin* ****ult *il* *r**tion m*t*o*s (*il*.Writ**llT*xt, *il*.*r**t*, *t*.) t**t in**rit** OS t*mpor*ry *ir**tory p*rmissions. T** *ommit s*ows r*pl***m*nts wit* *il*Op*r*tions.Inst*n**.*r**t* w*i** ***s Unix p*rmission