CVE-2023-46124

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-46124
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-46124.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-46124
Aliases
Published
2023-10-24T22:51:55Z
Modified
2025-11-04T19:32:09Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L CVSS Calculator
Summary
Server-Side Request Forgery Vulnerability in Custom Integration Upload
Details

Fides is an open-source privacy engineering platform for managing the fulfillment of data privacy requests in runtime environments, and the enforcement of privacy regulations in code. The Fides web application allows a custom integration to be uploaded as a ZIP file containing configuration and dataset definitions in YAML format. It was discovered that specially crafted YAML dataset and config files allow a malicious user to perform arbitrary requests to internal systems and exfiltrate data outside the environment (also known as a Server-Side Request Forgery). The application does not perform proper validation to block attempts to connect to internal (including localhost) resources. The vulnerability has been patched in Fides version 2.22.1.

Database specific
{
    "cwe_ids": [
        "CWE-918"
    ]
}
References

Affected packages

Git / github.com/ethyca/fides

Affected ranges

Type
GIT
Repo
https://github.com/ethyca/fides
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed