GHSA-2vpq-fh52-j3wv
Vulnerability from github
Issue
Snowflake discovered and remediated a vulnerability in the Snowflake Connector for Python. A function from the snowflake.connector.pandas_tools module is vulnerable to SQL injection.
This vulnerability affects versions 2.2.5 through 3.13.0. Snowflake fixed the issue in version 3.13.1.
Vulnerability Details
A function from the snowflake.connector.pandas_tools module is not sanitizing all of its arguments, and queries using them are not parametrized. An attacker controlling these arguments could achieve SQL injection by passing crafted input. Any SQL executed that way by an attacker would still run in the context of the current session.
Solution
Snowflake released version 3.13.1 of the Snowflake Connector for Python, which fixes this issue. We recommend users upgrade to version 3.13.1.
Additional Information
If you discover a security vulnerability in one of our products or websites, please report the issue to HackerOne. For more information, please see our Vulnerability Disclosure Policy.
{ "affected": [ { "database_specific": { "last_known_affected_version_range": "\u003c= 3.13.0" }, "package": { "ecosystem": "PyPI", "name": "snowflake-connector-python" }, "ranges": [ { "events": [ { "introduced": "2.2.5" }, { "fixed": "3.13.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-24793" ], "database_specific": { "cwe_ids": [ "CWE-89" ], "github_reviewed": true, "github_reviewed_at": "2025-01-29T20:50:33Z", "nvd_published_at": "2025-01-29T21:15:21Z", "severity": "HIGH" }, "details": "### Issue\nSnowflake discovered and remediated a vulnerability in the Snowflake Connector for Python. A function from the snowflake.connector.pandas_tools module is vulnerable to SQL injection.\n\nThis vulnerability affects versions 2.2.5 through 3.13.0. Snowflake fixed the issue in version 3.13.1.\n\n### Vulnerability Details\nA function from the snowflake.connector.pandas_tools module is not sanitizing all of its arguments, and queries using them are not parametrized. An attacker controlling these arguments could achieve SQL injection by passing crafted input. Any SQL executed that way by an attacker would still run in the context of the current session.\n\n### Solution\nSnowflake released version 3.13.1 of the Snowflake Connector for Python, which fixes this issue. We recommend users upgrade to version 3.13.1.\n\n### Additional Information\nIf you discover a security vulnerability in one of our products or websites, please report the issue to HackerOne. For more information, please see our [Vulnerability Disclosure Policy](https://hackerone.com/snowflake?type=team).", "id": "GHSA-2vpq-fh52-j3wv", "modified": "2025-04-09T20:10:21Z", "published": "2025-01-29T20:50:33Z", "references": [ { "type": "WEB", "url": "https://github.com/snowflakedb/snowflake-connector-python/security/advisories/GHSA-2vpq-fh52-j3wv" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24793" }, { "type": "WEB", "url": "https://github.com/snowflakedb/snowflake-connector-python/commit/f3f9b666518d29c31a49384bbaa9a65889e72056" }, { "type": "WEB", "url": "https://github.com/pypa/advisory-database/tree/main/vulns/snowflake-connector-python/PYSEC-2025-26.yaml" }, { "type": "PACKAGE", "url": "https://github.com/snowflakedb/snowflake-connector-python" }, { "type": "WEB", "url": "https://github.com/snowflakedb/snowflake-connector-python/releases/tag/v3.13.1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "snowflake-connector-python vulnerable to SQL Injection in write_pandas" }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.