cve/2024/CVE-2024-45053.md

19 lines
1.4 KiB
Markdown
Raw Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-45053](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45053)
![](https://img.shields.io/static/v1?label=Product&message=fides&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%202.19.0%2C%20%3C%202.44.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.19.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine&color=brightgreen)
### Description
Fides is an open-source privacy engineering platform. Starting in version 2.19.0 and prior to version 2.44.0, the Email Templating feature uses Jinja2 without proper input sanitization or rendering environment restrictions, allowing for Server-Side Template Injection that grants Remote Code Execution to privileged users. A privileged user refers to an Admin UI user with the default `Owner` or `Contributor` role, who can escalate their access and execute code on the underlying Fides Webserver container where the Jinja template rendering function is executed. The vulnerability has been patched in Fides version `2.44.0`. Users are advised to upgrade to this version or later to secure their systems against this threat. There are no workarounds.
### POC
#### Reference
- https://github.com/ethyca/fides/security/advisories/GHSA-c34r-238x-f7qx
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds