Описание
Fides is an open-source privacy engineering platform for managing the fulfillment of data privacy requests in a runtime environment, and the enforcement of privacy regulations in code. The Fides webserver API allows custom integrations to be uploaded as a ZIP file. This ZIP file must contain YAML files, but Fides can be configured to also accept the inclusion of custom Python code in it. The custom code is executed in a restricted, sandboxed environment, but the sandbox can be bypassed to execute any arbitrary code. The vulnerability allows the execution of arbitrary code on the target system within the context of the webserver python process owner on the webserver container, which by default is root, and leverage that access to attack underlying infrastructure and integrated systems. This vulnerability affects Fides versions 2.11.0 through 2.19.0. Exploitation is limited to API clients with the CONNECTOR_TEMPLATE_REGISTER authorization scope. In the Fides Admin UI this scope i
Ссылки
- Patch
- MitigationThird Party Advisory
- Patch
- MitigationThird Party Advisory
Уязвимые конфигурации
EPSS
8.8 High
CVSS3
7.2 High
CVSS3
Дефекты
Связанные уязвимости
Remote Code Execution in Custom Integration Upload
EPSS
8.8 High
CVSS3
7.2 High
CVSS3