CVE-2024-35189

6.5 MEDIUM
Published: May 30, 2024 Modified: October 20, 2025

Description

Fides is an open-source privacy engineering platform. The Fides webserver has a number of endpoints that retrieve `ConnectionConfiguration` records and their associated `secrets` which _can_ contain sensitive data (e.g. passwords, private keys, etc.). These `secrets` are stored encrypted at rest (in the application database), and the associated endpoints are not meant to expose that sensitive data in plaintext to API clients, as it could be compromising. Fides's developers have available to them a Pydantic field-attribute (`sensitive`) that they can annotate as `True` to indicate that a given secret field should not be exposed via the API. The application has an internal function that uses `sensitive` annotations to mask the sensitive fields with a `"**********"` placeholder value. This vulnerability is due to a bug in that function, which prevented `sensitive` API model fields that were _nested_ below the root-level of a `secrets` object from being masked appropriately. Only the `BigQuery` connection configuration secrets meets these criteria: the secrets schema has a nested sensitive `keyfile_creds.private_key` property that is exposed in plaintext via the APIs. Connection types other than `BigQuery` with sensitive fields at the root-level that are not nested are properly masked with the placeholder and are not affected by this vulnerability. This vulnerability has been patched in Fides version 2.37.0. Users are advised to upgrade to this version or later to secure their systems against this threat. Users are also advised to rotate any Google Cloud secrets used for BigQuery integrations in their Fides deployments. There are no known workarounds for this vulnerability.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://cloud.google.com/iam/docs/key-rotation
Source: security-advisories@github.com
Not Applicable
https://github.com/ethyca/fides/security/advisories/GHSA-rcvg-jj3g-rj7c
Source: security-advisories@github.com
Exploit Vendor Advisory
https://cloud.google.com/iam/docs/key-rotation
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
https://github.com/ethyca/fides/security/advisories/GHSA-rcvg-jj3g-rj7c
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Vendor Advisory

4 reference(s) from NVD

Quick Stats

CVSS v3 Score
6.5 / 10.0
EPSS (Exploit Probability)
0.3%
55th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

ethyca