2024-07-03 14:05:06 +00:00

76 lines
4.7 KiB
JSON

{
"id": "CVE-2024-38537",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-02T20:15:05.860",
"lastModified": "2024-07-03T12:53:24.977",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fides is an open-source privacy engineering platform. `fides.js`, a client-side script used to interact with the consent management features of Fides, used the `polyfill.io` domain in a very limited edge case, when it detected a legacy browser such as IE11 that did not support the fetch standard. Therefore it was possible for users of legacy, pre-2017 browsers who navigate to a page serving `fides.js` to download and execute malicious scripts from the `polyfill.io` domain when the domain was compromised and serving malware. No exploitation of `fides.js` via `polyfill.io` has been identified as of time of publication.\n\nThe vulnerability has been patched in Fides version `2.39.1`. Users are advised to upgrade to this version or later to secure their systems against this threat. On Thursday, June 27, 2024, Cloudflare and Namecheap intervened at a domain level to ensure `polyfill.io` and its subdomains could not resolve to the compromised service, rendering this vulnerability unexploitable. Prior to the domain level intervention, there were no server-side workarounds and the confidentiality, integrity, and availability impacts of this vulnerability were high. Clients could ensure they were not affected by using a modern browser that supported the fetch standard."
},
{
"lang": "es",
"value": "Fides es una plataforma de ingenier\u00eda de privacidad de c\u00f3digo abierto. `fides.js`, un script del lado del cliente utilizado para interactuar con las funciones de gesti\u00f3n de consentimiento de Fides, utiliz\u00f3 el dominio `polyfill.io` en un caso l\u00edmite muy limitado, cuando detect\u00f3 un navegador heredado como IE11 que no admit\u00eda el est\u00e1ndar de recuperaci\u00f3n. Por lo tanto, era posible que los usuarios de navegadores heredados anteriores a 2017 que navegaban a una p\u00e1gina que serv\u00eda `fides.js` descargaran y ejecutaran scripts maliciosos desde el dominio `polyfill.io` cuando el dominio estaba comprometido y serv\u00eda malware. No se ha identificado ninguna explotaci\u00f3n de `fides.js` a trav\u00e9s de `polyfill.io` al momento de la publicaci\u00f3n. La vulnerabilidad ha sido parcheada en la versi\u00f3n `2.39.1` de Fides. Se recomienda a los usuarios que actualicen a esta versi\u00f3n o posterior para proteger sus sistemas contra esta amenaza. El jueves 27 de junio de 2024, Cloudflare y Namecheap intervinieron a nivel de dominio para garantizar que `polyfill.io` y sus subdominios no pudieran resolver el servicio comprometido, haciendo que esta vulnerabilidad no se pudiera explotar. Antes de la intervenci\u00f3n a nivel de dominio, no hab\u00eda workarounds en el lado del servidor y los impactos de esta vulnerabilidad en la confidencialidad, integridad y disponibilidad eran altos. Los clientes pod\u00edan asegurarse de no verse afectados utilizando un navegador moderno que admitiera el est\u00e1ndar de recuperaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"baseSeverity": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 0.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-829"
}
]
}
],
"references": [
{
"url": "https://fetch.spec.whatwg.org",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/ethyca/fides/commit/868c4d629760572192bd61db34f5a4458ed12005",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/ethyca/fides/pull/5026",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/ethyca/fides/security/advisories/GHSA-cvw4-c69g-7v7m",
"source": "security-advisories@github.com"
},
{
"url": "https://sansec.io/research/polyfill-supply-chain-attack",
"source": "security-advisories@github.com"
}
]
}