Skip to content

fix(deps): Update module github.com/snowflakedb/gosnowflake to v1.6.19 [SECURITY]#11411

Merged
kodiakhq[bot] merged 1 commit intomainfrom
renovate/go-github.com/snowflakedb/gosnowflake-vulnerability
Jun 10, 2023
Merged

fix(deps): Update module github.com/snowflakedb/gosnowflake to v1.6.19 [SECURITY]#11411
kodiakhq[bot] merged 1 commit intomainfrom
renovate/go-github.com/snowflakedb/gosnowflake-vulnerability

Conversation

@cq-bot
Copy link
Copy Markdown
Contributor

@cq-bot cq-bot commented Jun 10, 2023

This PR contains the following updates:

Package Type Update Change
github.com/snowflakedb/gosnowflake require patch v1.6.18 -> v1.6.19

⚠ Dependency Lookup Warnings ⚠

Warnings were logged while processing this repo. Please check the Dependency Dashboard for more information.

GitHub Vulnerability Alerts

CVE-2023-34231

Issue

Snowflake was informed via our bug bounty program of a command injection vulnerability in the Snowflake Golang driver via SSO browser URL authentication.

Impacted driver package:

gosnowflake

Impacted version range:

before Version 1.6.19

Attack Scenario

In order to exploit the potential for command injection, an attacker would need to be successful in (1) establishing a malicious resource and (2) redirecting users to utilize the resource. The attacker could set up a malicious, publicly accessible server which responds to the SSO URL with an attack payload. If the attacker then tricked a user into visiting the maliciously crafted connection URL, the user’s local machine would render the malicious payload, leading to a remote code execution.

This attack scenario can be mitigated through URL whitelisting as well as common anti-phishing resources.

Solution

On March 21, 2023, Snowflake merged a patch that fixed a command injection vulnerability in the Snowflake Golang driver via SSO browser URL authentication. The vulnerability affected the Snowflake Golang driver before Version 1.6.19. We strongly recommend users upgrade to Version 1.6.19 as soon as possible via the following resources: Go Snowflake Driver

Additional Information

If you discover a security vulnerability in one of our products or websites, please report the issue to HackerOne. For more information, please see our Vulnerability Disclosure Policy.


Release Notes

snowflakedb/gosnowflake

v1.6.19: Release

Compare Source


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@cq-bot cq-bot added automerge Automatically merge once required checks pass security labels Jun 10, 2023
@kodiakhq kodiakhq bot merged commit 1c2b68d into main Jun 10, 2023
@kodiakhq kodiakhq bot deleted the renovate/go-github.com/snowflakedb/gosnowflake-vulnerability branch June 10, 2023 00:38
kodiakhq bot pushed a commit that referenced this pull request Jun 12, 2023
🤖 I have created a release *beep* *boop*
---


## [2.2.3](plugins-destination-snowflake-v2.2.2...plugins-destination-snowflake-v2.2.3) (2023-06-12)


### Bug Fixes

* **deps:** Update github.com/cloudquery/arrow/go/v13 digest to 8f72077 ([#11395](#11395)) ([d91fc5c](d91fc5c))
* **deps:** Update github.com/cloudquery/arrow/go/v13 digest to 90670b8 ([#11279](#11279)) ([a6cdc91](a6cdc91))
* **deps:** Update github.com/cloudquery/arrow/go/v13 digest to b359e74 ([#11405](#11405)) ([5d92765](5d92765))
* **deps:** Update github.com/cloudquery/arrow/go/v13 digest to e258cfb ([#11391](#11391)) ([eacbe9a](eacbe9a))
* **deps:** Update module github.com/snowflakedb/gosnowflake to v1.6.19 [SECURITY] ([#11411](#11411)) ([1c2b68d](1c2b68d))

---
This PR was generated with [Release Please](https://github.com/googleapis/release-please). See [documentation](https://github.com/googleapis/release-please#release-please).
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

automerge Automatically merge once required checks pass

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants