ethyca-fides@2.44.0rc3 vulnerabilities

Open-source ecosystem for data privacy as code.

Direct Vulnerabilities

Known vulnerabilities in the ethyca-fides package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Improper Control of Generation of Code ('Code Injection')

ethyca-fides is an Open-source ecosystem for data privacy as code.

Affected versions of this package are vulnerable to Improper Control of Generation of Code ('Code Injection') due to improper input sanitization and lack of rendering environment restrictions in the Email Templating feature. An attacker can execute arbitrary code on the server by injecting malicious templates.

Note:

This is only exploitable if the attacker has Owner or Contributor role access.

OAuth clients with the messaging-template:update scope are also authorized to use the PUT /api/v1/messaging/templates/ Fides Webserver API endpoint and may also exploit this vulnerability.

How to fix Improper Control of Generation of Code ('Code Injection')?

Upgrade ethyca-fides to version 2.44.0 or higher.

[2.19.0,2.44.0)
  • M
Timing Attack

ethyca-fides is an Open-source ecosystem for data privacy as code.

Affected versions of this package are vulnerable to Timing Attack due to the discrepancy in response times between valid and invalid usernames in the login endpoint. An attacker can determine the existence of valid usernames by analyzing the time it takes for the server to respond to login requests. By exploiting this vulnerability, an attacker can enumerate users on the system.

How to fix Timing Attack?

Upgrade ethyca-fides to version 2.44.0 or higher.

[,2.44.0)