Information Exposure Through an Error Message Affecting ethyca-fides package, versions [,2.37.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-ETHYCAFIDES-7172781
  • published31 May 2024
  • disclosed30 May 2024
  • creditAdam Sachs

Introduced: 30 May 2024

CVE-2024-35189  (opens in a new tab)
CWE-201  (opens in a new tab)

How to fix?

Upgrade ethyca-fides to version 2.37.0 or higher.

Overview

ethyca-fides is an Open-source ecosystem for data privacy as code.

Affected versions of this package are vulnerable to Information Exposure Through an Error Message due to a flaw in the internal function handling sensitive annotations, which fails to mask nested sensitive fields properly. An attacker can access sensitive data such as private keys by exploiting this vulnerability in the API endpoint exposure. This is only exploitable if the BigQuery connection configuration secrets are used, as other connection types with non-nested sensitive fields are not affected.

References

CVSS Scores

version 3.1