First published: Tue Jul 18 2023(Updated: )
### Impact The Fides webserver is vulnerable to a type of Denial of Service (DoS) attack. Attackers can exploit a weakness in the connector template upload feature to upload a malicious zip bomb file, resulting in resource exhaustion and service unavailability for all users of the Fides webserver. This vulnerability affects Fides versions `2.11.0` through `2.15.1`. Exploitation is limited to users with elevated privileges with the `CONNECTOR_TEMPLATE_REGISTER` scope, which includes root users and users with the owner role. ### Patches The vulnerability has been patched in Fides version `2.16.0`. Users are advised to upgrade to this version or later to secure their systems against this threat. ### Workarounds There is no known workaround to remediate this vulnerability without upgrading. If an attack occurs, the impact can be mitigated by manually or automatically restarting the affected container. ### References More information about this type of vulnerability can be found at the following links: - https://www.bamsoftware.com/hacks/zipbomb/ - https://python-security.readthedocs.io/security.html#archives-and-zip-bomb-cve-2019-9674
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ethyca Fides | >=2.11.0<2.16.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37480 is a vulnerability in the Fides webserver that allows attackers to upload a malicious zip bomb file, resulting in resource exhaustion and service unavailability.
CVE-2023-37480 allows for a type of Denial of Service (DoS) attack, which can lead to service unavailability for all users of the Fides webserver.
Fides versions 2.11.0 to 2.16.0 are affected by CVE-2023-37480.
CVE-2023-37480 has a severity value of 4.9, which is considered medium.
To mitigate CVE-2023-37480, update Fides to version 2.16.0 or higher.