snowflake-connector-python vulnerable to insecure cache files permissions
Moderate severity
GitHub Reviewed
Published
Jan 29, 2025
in
snowflakedb/snowflake-connector-python
•
Updated Jan 29, 2025
Package
Affected versions
>= 2.3.7, <= 3.13.0
Patched versions
3.13.1
Description
Published to the GitHub Advisory Database
Jan 29, 2025
Reviewed
Jan 29, 2025
Published by the National Vulnerability Database
Jan 29, 2025
Last updated
Jan 29, 2025
Issue
Snowflake discovered and remediated a vulnerability in the Snowflake Connector for Python. On Linux systems, when temporary credential caching is enabled, the Snowflake Connector for Python will cache temporary credentials locally in a world-readable file.
This vulnerability affects versions 2.3.7 through 3.13.0. Snowflake fixed the issue in version 3.13.1.
Vulnerability Details
On Linux, when either EXTERNALBROWSER or USERNAME_PASSWORD_MFA authentication methods are used with temporary credential caching enabled, the Snowflake Connector for Python will cache the temporary credentials in a local file. In the vulnerable versions of the Driver, this file is created with world-readable permissions.
Solution
Snowflake released version 3.13.1 of the Snowflake Connector for Python, which fixes this issue. We recommend users upgrade to version 3.13.1.
Additional Information
If you discover a security vulnerability in one of our products or websites, please report the issue to HackerOne. For more information, please see our Vulnerability Disclosure Policy.
References