Loading HuntDB...

GHSA-jq3w-9mgf-43m4

GitHub Security Advisory

Fides Server-Side Request Forgery Vulnerability in Custom Integration Upload

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

### Impact

The Fides web application allows a custom integration to be uploaded as a ZIP file containing configuration and dataset definitions in YAML format.

It was discovered that specially crafted YAML dataset and config files allow a malicious user to perform arbitrary requests to internal systems and exfiltrate data outside the environment (also known as a Server-Side Request Forgery). The application does not perform proper validation to block attempts to connect to internal (including localhost) resources.

Exploitation is limited to API clients with the `CONNECTOR_TEMPLATE_REGISTER` authorization scope. In the Fides Admin UI this scope is restricted to highly privileged users, specifically root users and users with the owner role.

### Patches
The vulnerability has been patched in Fides version `2.22.1`. Users are advised to upgrade to this version or later to secure their systems against this threat.

### Workarounds
There are no workarounds.

Affected Packages

PyPI ethyca-fides
Affected versions: 0 (fixed in 2.22.1)

Related CVEs

Key Information

GHSA ID
GHSA-jq3w-9mgf-43m4
Published
October 24, 2023 2:14 AM
Last Modified
October 31, 2023 9:20 PM
CVSS Score
7.5 /10
Primary Ecosystem
PyPI
Primary Package
ethyca-fides
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 12, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.