ghsa-53q7-4874-24qg
Vulnerability from github
SERVER_SIDE_FIDES_API_URL
is a server-side configuration environment variable used by the Fides Privacy Center to communicate with the Fides webserver backend. The value of this variable is a URL which typically includes a private IP address, private domain name, and/or port.
This vulnerability allows an unauthenticated attacker to make a HTTP GET request from the Privacy Center that discloses the value of this server-side URL.
Impact
Disclosure of server-side configuration giving an attacker information on server-side ports, private IP addresses, and/or private domain names.
Patches
The vulnerability has been patched in Fides version 2.39.2
. Users are advised to upgrade to this version or later to secure their systems against this threat.
Workarounds
There are no workarounds.
Proof of Concept
-
Set the value of the environment variable
FIDES_PRIVACY_CENTER__SERVER_SIDE_FIDES_API_URL
of your Fides Privacy Center container before start-up to a private value such ashttps://some.private.domain.name/api/v1
and start the Privacy Center application. -
Once the application is up, perform a HTTP GET request of the Privacy Center's main page e.g.
https://privacy.example.com
. The value ofSERVER_SIDE_FIDES_API_URL
is returned in the response's body.
~ ❯ curl -s https://privacy.example.com/ | \
grep '__NEXT_DATA__' | \
sed 's/.*<script id="__NEXT_DATA__" type="application\/json">//;s/<\/script>.*//' | \
jq '.props.serverEnvironment.settings.SERVER_SIDE_FIDES_API_URL'
"https://some.private.domain.name/api/v1"
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "ethyca-fides" }, "ranges": [ { "events": [ { "introduced": "2.19.0" }, { "fixed": "2.39.2" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-31223" ], "database_specific": { "cwe_ids": [ "CWE-497" ], "github_reviewed": true, "github_reviewed_at": "2024-07-05T20:40:06Z", "nvd_published_at": "2024-07-03T18:15:05Z", "severity": "MODERATE" }, "details": "`SERVER_SIDE_FIDES_API_URL` is a server-side configuration environment variable used by the Fides Privacy Center to communicate with the Fides webserver backend. The value of this variable is a URL which typically includes a private IP address, private domain name, and/or port.\n\nThis vulnerability allows an unauthenticated attacker to make a HTTP GET request from the Privacy Center that discloses the value of this server-side URL.\n\n### Impact\n\nDisclosure of server-side configuration giving an attacker information on server-side ports, private IP addresses, and/or private domain names.\n\n### Patches\nThe vulnerability has been patched in Fides version `2.39.2`. Users are advised to upgrade to this version or later to secure their systems against this threat.\n\n### Workarounds\nThere are no workarounds.\n\n### Proof of Concept\n\n1. Set the value of the environment variable `FIDES_PRIVACY_CENTER__SERVER_SIDE_FIDES_API_URL` of your Fides Privacy Center container before start-up to a private value such as `https://some.private.domain.name/api/v1` and start the Privacy Center application.\n\n2. Once the application is up, perform a HTTP GET request of the Privacy Center\u0027s main page e.g. `https://privacy.example.com` . The value of `SERVER_SIDE_FIDES_API_URL` is returned in the response\u0027s body.\n\n\n```\n~ \u276f curl -s https://privacy.example.com/ | \\\ngrep \u0027__NEXT_DATA__\u0027 | \\\nsed \u0027s/.*\u003cscript id=\"__NEXT_DATA__\" type=\"application\\/json\"\u003e//;s/\u003c\\/script\u003e.*//\u0027 | \\\njq \u0027.props.serverEnvironment.settings.SERVER_SIDE_FIDES_API_URL\u0027\n\"https://some.private.domain.name/api/v1\"\n```", "id": "GHSA-53q7-4874-24qg", "modified": "2024-07-05T20:40:06Z", "published": "2024-07-05T20:40:06Z", "references": [ { "type": "WEB", "url": "https://github.com/ethyca/fides/security/advisories/GHSA-53q7-4874-24qg" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31223" }, { "type": "WEB", "url": "https://github.com/ethyca/fides/commit/0555080541f18a5aacff452c590ac9a1b56d7097" }, { "type": "WEB", "url": "https://github.com/ethyca/fides/commit/cd510216b281de5443ec1c126add95cc5be0970a" }, { "type": "PACKAGE", "url": "https://github.com/ethyca/fides" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ], "summary": "Information Disclosure Vulnerability in Privacy Center of SERVER_SIDE_FIDES_API_URL" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.