![]() Exploitation is limited to API clients with the `CONNECTOR_TEMPLATE_REGISTER` authorization scope. This vulnerability affects Fides versions `2.11.0` through `2.19.0`. The vulnerability allows the execution of arbitrary code on the target system within the context of the webserver python process owner on the webserver container, which by default is `root`, and leverage that access to attack underlying infrastructure and integrated systems. The custom code is executed in a restricted, sandboxed environment, but the sandbox can be bypassed to execute any arbitrary code. This ZIP file must contain YAML files, but Fides can be configured to also accept the inclusion of custom Python code in it. The Fides webserver API allows custom integrations to be uploaded as a ZIP file. A sender can cause a receiver to overwrite files during ZIP extraction.įides is an open-source privacy engineering platform for managing the fulfillment of data privacy requests in a runtime environment, and the enforcement of privacy regulations in code. ![]() ![]() An issue was discovered in Croc through 9.6.5. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |