First published: Tue Jul 18 2023(Updated: )
### Impact The Fides webserver is vulnerable to a type of Denial of Service (DoS) attack. Attackers can exploit this vulnerability to upload zip files containing malicious SVG bombs (similar to a billion laughs attack), causing resource exhaustion in Admin UI browser tabs and creating a persistent denial of service of the 'new connector' page (`datastore-connection/new`). This vulnerability affects Fides versions `2.11.0` through `2.15.1`. Exploitation is limited to users with elevated privileges with the `CONNECTOR_TEMPLATE_REGISTER` scope, which includes root users and users with the owner role. ### Patches The vulnerability has been patched in Fides version `2.16.0`. Users are advised to upgrade to this version or later to secure their systems against this threat. ### Workarounds There is no known workaround to remediate this vulnerability without upgrading.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ethyca Fides | >=2.11.0<2.16.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The Fides webserver is vulnerable to a type of Denial of Service (DoS) attack, allowing attackers to upload malicious SVG bomb zip files.
The Fides software versions between 2.11.0 and 2.16.0 are affected by the CVE-2023-37481 vulnerability.
CVE-2023-37481 has a severity level of 4.9 (medium).
To fix CVE-2023-37481, update your Fides software to version 2.16.0 or later.
The Common Weakness Enumeration (CWE) ID of CVE-2023-37481 is 400.