Miggo Logo

CVE-2023-48224: Ethyca Fides Cryptographically Weak Generation of One-Time Codes for Identity Verification

8.2

CVSS Score
3.1

Basic Information

EPSS Score
0.60885%
Published
11/16/2023
Updated
11/16/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
ethyca-fidespip< 2.24.02.24.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from using Python's non-cryptographic random module for security-sensitive code generation. The commit diff shows replacement of random.choice with secrets.choice in generate_id_verification_code, directly addressing CWE-338. This was the only function modified in the patch, and the vulnerability description explicitly calls out random module usage for OTP generation as the weakness.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T** *i**s Priv**y **nt*r *llows **t* su*j**t us*rs to su*mit priv**y *n* *ons*nt r*qu*sts to **t* *ontroll*r us*rs o* t** *i**s w** *ppli**tion. Priv**y r*qu*sts *llow **t* su*j**ts to su*mit * r*qu*st to ****ss *ll p*rson **t* **l* *y t

Reasoning

T** vuln*r**ility st*ms *rom usin* Pyt*on's non-*rypto*r*p*i* r*n*om mo*ul* *or s**urity-s*nsitiv* *o** **n*r*tion. T** *ommit *i** s*ows r*pl***m*nt o* r*n*om.**oi** wit* s**r*ts.**oi** in **n*r*t*_i*_v*ri*i**tion_*o**, *ir**tly ***r*ssin* *W*-***.