// For flags

CVE-2023-46124

Server-Side Request Forgery Vulnerability in Custom Integration Upload

Severity Score

7.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Fides is an open-source privacy engineering platform for managing the fulfillment of data privacy requests in runtime environments, and the enforcement of privacy regulations in code. The Fides web application allows a custom integration to be uploaded as a ZIP file containing configuration and dataset definitions in YAML format. It was discovered that specially crafted YAML dataset and config files allow a malicious user to perform arbitrary requests to internal systems and exfiltrate data outside the environment (also known as a Server-Side Request Forgery). The application does not perform proper validation to block attempts to connect to internal (including localhost) resources. The vulnerability has been patched in Fides version `2.22.1`.

Fides es una plataforma de ingeniería de privacidad de código abierto para gestionar el cumplimiento de solicitudes de privacidad de datos en entornos de ejecución y la aplicación de regulaciones de privacidad en código. La aplicación web de Fides permite cargar una integración personalizada como un archivo ZIP que contiene definiciones de configuración y conjuntos de datos en formato YAML. Se descubrió que el conjunto de datos y los archivos de configuración YAML especialmente manipulados permiten a un usuario malintencionado realizar solicitudes arbitrarias a sistemas internos y extraer datos fuera del entorno (también conocido como Server-Side Request Forgery). La aplicación no realiza una validación adecuada para bloquear los intentos de conectarse a recursos internos (incluido el host local). La vulnerabilidad ha sido parcheada en la versión `2.22.1` de Fides.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2023-10-16 CVE Reserved
  • 2023-10-24 CVE Published
  • 2024-09-11 CVE Updated
  • 2024-10-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-918: Server-Side Request Forgery (SSRF)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ethyca
Search vendor "Ethyca"
Fides
Search vendor "Ethyca" for product "Fides"
< 2.22.1
Search vendor "Ethyca" for product "Fides" and version " < 2.22.1"
-
Affected