Miggo Logo

CVE-2023-37481: Fides Webserver Vulnerable to SVG Bomb File Uploads

2.7

CVSS Score
3.1

Basic Information

EPSS Score
0.2468%
Published
7/18/2023
Updated
11/9/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
ethyca-fidespip>= 2.11.0, < 2.16.02.16.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from processing user-uploaded SVG files in the connector registration flow without proper XML validation. The pre-patch version of 'save_template' in connector_registry_service.py handled SVG content (line 214-220) without calling verify_svg, allowing malicious XML entities and xlink references. The patch added verify_svg validation precisely at this code location, confirming this was the vulnerable entry point. The CWE-400 mapping and commit diff showing added SVG validation at this code location provide high confidence in this assessment.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T** *i**s w**s*rv*r is vuln*r**l* to * typ* o* **ni*l o* S*rvi** (*oS) *tt**k. *tt**k*rs **n *xploit t*is vuln*r**ility to uplo** zip *il*s *ont*inin* m*li*ious SV* *om*s (simil*r to * *illion l*u**s *tt**k), **usin* r*sour** *x**ustion in

Reasoning

T** vuln*r**ility st*mm** *rom pro**ssin* us*r-uplo**** SV* *il*s in t** *onn**tor r**istr*tion *low wit*out prop*r XML v*li**tion. T** pr*-p*t** v*rsion o* 's*v*_t*mpl*t*' in *onn**tor_r**istry_s*rvi**.py **n*l** SV* *ont*nt (lin* ***-***) wit*out *