Miggo Logo

CVE-2023-37480:
Fides Webserver Vulnerable to Zip Bomb File Uploads

2.7

CVSS Score
3.1

Basic Information

EPSS Score
0.08424%
Published
7/18/2023
Updated
11/6/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
ethyca-fidespip>= 2.11.0, < 2.16.02.16.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the save_template function handling zip uploads without size validation. The pre-patch code lacked the verify_zip check that was added in the fix. This function is the entry point for connector template uploads and was responsible for processing potentially malicious zip files without safeguards against decompression bombs. The added verify_zip function in the patch directly addresses this gap by implementing size checks before processing.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T** *i**s w**s*rv*r is vuln*r**l* to * typ* o* **ni*l o* S*rvi** (*oS) *tt**k. *tt**k*rs **n *xploit * w**kn*ss in t** *onn**tor t*mpl*t* uplo** ***tur* to uplo** * m*li*ious zip *om* *il*, r*sultin* in r*sour** *x**ustion *n* s*rvi** un*v

Reasoning

T** vuln*r**ility st*ms *rom t** s*v*_t*mpl*t* *un*tion **n*lin* zip uplo**s wit*out siz* v*li**tion. T** pr*-p*t** *o** l**k** t** v*ri*y_zip ****k t**t w*s ***** in t** *ix. T*is *un*tion is t** *ntry point *or *onn**tor t*mpl*t* uplo**s *n* w*s r*