CVE-2024-8055
Description
Vanna v0.6.3 is vulnerable to SQL injection via Snowflake database in its file staging operations using the PUT and COPY commands. This vulnerability allows unauthenticated remote users to read arbitrary local files on the victim server, such as /etc/passwd, by exploiting the exposed SQL queries through a Python Flask API.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Vanna v0.6.3 is vulnerable to SQL injection via Snowflake file staging, allowing unauthenticated remote attackers to read arbitrary local files.
The vulnerability resides in Vanna v0.6.3, an AI-powered SQL generation tool, specifically in its file staging operations for Snowflake databases. The PUT and COPY commands are exposed through a Python Flask API without proper input sanitization, allowing SQL injection attacks [1].
An unauthenticated remote attacker can craft malicious SQL queries that exploit the file staging functionality. By sending specially crafted requests to the Flask API, the attacker can inject arbitrary SQL commands that are executed against the Snowflake database. This enables the attacker to read arbitrary local files from the victim server, such as /etc/passwd, by leveraging the database's file access capabilities [1].
The impact is severe: an attacker can exfiltrate sensitive local files from the server, potentially including configuration files, credentials, or other confidential data. Since no authentication is required, any remote attacker with network access to the vulnerable instance can exploit this flaw. The CVSS score of 7.5 (High) reflects the ease of exploitation and the potential for data breach [1].
As of the publication date, the vulnerability has been reported to the vendor via the Huntr bug bounty platform. Users of Vanna v0.6.3 should monitor for security updates and consider restricting network access to the Flask API or implementing additional authentication and input validation measures until a patch is released [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.