Vulnerability Description
Fides is an open-source privacy engineering platform. Starting in version 2.19.0 and prior to version 2.44.0, the Email Templating feature uses Jinja2 without proper input sanitization or rendering environment restrictions, allowing for Server-Side Template Injection that grants Remote Code Execution to privileged users. A privileged user refers to an Admin UI user with the default `Owner` or `Contributor` role, who can escalate their access and execute code on the underlying Fides Webserver container where the Jinja template rendering function is executed. The vulnerability has been patched in Fides version `2.44.0`. Users are advised to upgrade to this version or later to secure their systems against this threat. There are no workarounds.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ethyca | Fides | >= 2.19.0, < 2.44.0 |
Related Weaknesses (CWE)
References
- https://github.com/ethyca/fides/commit/829cbd9cb5ef9c814fbac1ed6800e8d939d359c5Patch
- https://github.com/ethyca/fides/security/advisories/GHSA-c34r-238x-f7qxExploitVendor Advisory
FAQ
What is CVE-2024-45053?
CVE-2024-45053 is a vulnerability with a CVSS score of 9.1 (CRITICAL). Fides is an open-source privacy engineering platform. Starting in version 2.19.0 and prior to version 2.44.0, the Email Templating feature uses Jinja2 without proper input sanitization or rendering en...
How severe is CVE-2024-45053?
CVE-2024-45053 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-45053?
Check the references section above for vendor advisories and patch information. Affected products include: Ethyca Fides.