CVE-2023-46125: Fides Information Disclosure Vulnerability in Config API Endpoint
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.40036%
CWE
Published
10/24/2023
Updated
11/11/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| ethyca-fides | pip | < 2.22.1 | 2.22.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper role-based access control (RBAC) configuration rather than specific code functions. The root cause was the inclusion of the CONFIG_READ scope in the viewer and contributor role definitions (as class-level variables in RoleRegistryEnum), allowing lower-privileged users to access the sensitive config endpoint. The patch removed CONFIG_READ from these roles' scopes in src/fides/api/oauth/roles.py. While this configuration error created the vulnerability, there are no traditional 'functions' to list here - the exposure was caused by misconfigured authorization scopes in role definitions rather than flawed function logic.