Server-side Request Forgery (SSRF) Affecting ethyca-fides package, versions [,2.22.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.14% (52nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PYTHON-ETHYCAFIDES-6028331
  • published 26 Oct 2023
  • disclosed 24 Oct 2023
  • credit Unknown

How to fix?

Upgrade ethyca-fides to version 2.22.1 or higher.

Overview

ethyca-fides is an Open-source ecosystem for data privacy as code.

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) in the saas_util.py and authenticated_client.py files. An attacker can perform arbitrary requests to internal systems and exfiltrate data outside the environment by uploading specially crafted YAML dataset and config files.

Note: This is only exploitable if the API client has the CONNECTOR_TEMPLATE_REGISTER authorization scope, which is typically restricted to highly privileged users such as root users and users with the owner role.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
5.5 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    High
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    None
  • Availability (A)
    Low
Expand this section

NVD

7.2 high