CVE-2024-34715 – ethyca-fides
Package
Manager: pip
Name: ethyca-fides
Vulnerable Version: >=0 <2.37.0
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00051 pctl0.15614
Details
Fides Webserver Logs Hosted Database Password Partial Exposure Vulnerability The Fides webserver requires a connection to a hosted PostgreSQL database for persistent storage of application data. If the password used by the webserver for this database connection includes special characters such as `@` and `$`, webserver startup fails and the part of the password following the special character is exposed in webserver error logs. This is caused by improper escaping of the SQLAlchemy password string, see [here](https://docs.sqlalchemy.org/en/14/core/engines.html#escaping-special-characters-such-as-signs-in-passwords) and [here](https://github.com/sqlalchemy/sqlalchemy/discussions/6615) for more info. ### Impact Partial exposure of hosted database password in webserver logs ### Patches The vulnerability has been patched in Fides version `2.37.0`. Users are advised to upgrade to this version or later to secure their systems against this threat. ### Workarounds There are no workarounds. ### Proof of Concept 1. Create a hosted PostgreSQL database for Fides with a password including `@` or `$` e.g. `p@ssword` 2. Run Fides and observe failure, sample log attached ``` fides | 2024-02-28 14:27:52.609 | ERROR | fides.api.db.database:configure_db:117 - Unable to configure database: sqlalchemy.exc.OperationalError: (psycopg2.OperationalError) could not translate host name "ssword@fides-db" to address: Name or service not known ```
Metadata
Created: 2024-05-29T15:25:51Z
Modified: 2024-05-31T20:44:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-8cm5-jfj2-26q7/GHSA-8cm5-jfj2-26q7.json
CWE IDs: ["CWE-116", "CWE-532"]
Alternative ID: GHSA-8cm5-jfj2-26q7
Finding: F404
Auto approve: 1