First published: Tue Oct 24 2023(Updated: )
### Impact The Fides web application allows a custom integration to be uploaded as a ZIP file containing configuration and dataset definitions in YAML format. It was discovered that specially crafted YAML dataset and config files allow a malicious user to perform arbitrary requests to internal systems and exfiltrate data outside the environment (also known as a Server-Side Request Forgery). The application does not perform proper validation to block attempts to connect to internal (including localhost) resources. Exploitation is limited to API clients with the `CONNECTOR_TEMPLATE_REGISTER` authorization scope. In the Fides Admin UI this scope is restricted to highly privileged users, specifically root users and users with the owner role. ### Patches The vulnerability has been patched in Fides version `2.22.1`. Users are advised to upgrade to this version or later to secure their systems against this threat. ### Workarounds There are no workarounds.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ethyca Fides | <2.22.1 | |
pip/ethyca-fides | <2.22.1 | 2.22.1 |
<2.22.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability allows a malicious user to perform arbitrary requests to internal systems.
The vulnerability affects the Fides web application by allowing a custom integration upload that can be exploited by a malicious user.
The affected software is the ethyca-fides package with version 2.22.1 installed via pip.
To fix the vulnerability, update the ethyca-fides package to version 2.22.1 or higher using pip.
The CWE ID for CVE-2023-46124 is 918.