Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gx6c-pv62-9mcf

Опубликовано: 27 фев. 2026
Источник: github
Github: Прошло ревью
CVSS4: 1.9
CVSS3: 3.3

Описание

Snowflake JDBC Driver is Vulnerable to Uncontrolled Resource Consumption through SdkProxyRoutePlanner

A weakness has been identified in Snowflake JDBC Driver up to 4.0.1. Impacted is the function SdkProxyRoutePlanner of the file src/main/java/net/snowflake/client/internal/core/SdkProxyRoutePlanner.java of the component JDBC URL Handler. Executing a manipulation of the argument nonProxyHosts can lead to inefficient regular expression complexity. The attack can only be executed locally. The exploit has been made available to the public and could be used for attacks. This patch is called 5fb0a8a318a2ed87f4022a1f56e742424ba94052. A patch should be applied to remediate this issue.

Пакеты

Наименование

net.snowflake:snowflake-jdbc

maven
Затронутые версииВерсия исправления

<= 4.0.1

Отсутствует

EPSS

Процентиль: 1%
0.0001
Низкий

1.9 Low

CVSS4

3.3 Low

CVSS3

Дефекты

CWE-400

Связанные уязвимости

CVSS3: 3.3
redhat
28 дней назад

A weakness has been identified in snowflakedb snowflake-jdbc up to 4.0.1. Impacted is the function SdkProxyRoutePlanner of the file src/main/java/net/snowflake/client/internal/core/SdkProxyRoutePlanner.java of the component JDBC URL Handler. Executing a manipulation of the argument nonProxyHosts can lead to inefficient regular expression complexity. The attack can only be executed locally. The exploit has been made available to the public and could be used for attacks. This patch is called 5fb0a8a318a2ed87f4022a1f56e742424ba94052. A patch should be applied to remediate this issue.

CVSS3: 3.3
nvd
28 дней назад

A weakness has been identified in snowflakedb snowflake-jdbc up to 4.0.1. Impacted is the function SdkProxyRoutePlanner of the file src/main/java/net/snowflake/client/internal/core/SdkProxyRoutePlanner.java of the component JDBC URL Handler. Executing a manipulation of the argument nonProxyHosts can lead to inefficient regular expression complexity. The attack can only be executed locally. The exploit has been made available to the public and could be used for attacks. This patch is called 5fb0a8a318a2ed87f4022a1f56e742424ba94052. A patch should be applied to remediate this issue.

EPSS

Процентиль: 1%
0.0001
Низкий

1.9 Low

CVSS4

3.3 Low

CVSS3

Дефекты

CWE-400