Miggo Logo

CVE-2023-47114:
Ethyca Fides HTML Injection Vulnerability in HTML-Formatted DSR Packages

4.3

CVSS Score

Basic Information

EPSS Score
-
Published
11/8/2023
Updated
11/9/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
ethyca-fidespip>= 2.15.1, < 2.23.32.23.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unescaped HTML template rendering. The commit diff shows the Jinja Environment was initialized without 'autoescape=True' prior to patching. The _populate_template method used this unsafe environment to render user-controlled data into HTML templates. Enabling autoescape in the Environment constructor (added in patch) directly addresses the XSS vulnerability by ensuring proper HTML escaping during template rendering.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T** *i**s w** *ppli**tion *llows **t* su*j**t us*rs to r*qu*st ****ss to t**ir p*rson*l **t*. I* t** r*qu*st is *pprov** *y t** **t* *ontroll*r us*r op*r*tin* t** *i**s w** *ppli**tion, t** **t* su*j**t's p*rson*l **t* **n t**n r*tri*v**

Reasoning

T** vuln*r**ility st*ms *rom un*s**p** *TML t*mpl*t* r*n**rin*. T** *ommit *i** s*ows t** Jinj* *nvironm*nt w*s initi*liz** wit*out '*uto*s**p*=Tru*' prior to p*t**in*. T** _popul*t*_t*mpl*t* m*t*o* us** t*is uns*** *nvironm*nt to r*n**r us*r-*ontrol