Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f4mm-2r69-mg5f

Опубликовано: 25 окт. 2022
Источник: github
Github: Прошло ревью
CVSS3: 5.9

Описание

OpenFGA Authorization Bypass

Overview

During our internal security assessment, it was discovered that OpenFGA versions v0.2.3 and prior are vulnerable to authorization bypass under certain conditions.

Am I Affected?

You are affected by this vulnerability if you are using openfga/openfga version v0.2.3 or prior, and your model has a relation defined as a tupleset (the right hand side of a ‘from’ statement) that involves anything other than a direct relationship (e.g. ‘as self’)

How to fix that?

Upgrade to version v0.2.4.

Backward Compatibility

This update is not backward compatible. Any model involving rewritten tupleset relations will no longer be acceptable and has to be modified.

Пакеты

Наименование

github.com/openfga/openfga

go
Затронутые версииВерсия исправления

<= 0.2.3

0.2.4

EPSS

Процентиль: 56%
0.00334
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-285
CWE-863

Связанные уязвимости

CVSS3: 5.9
nvd
больше 3 лет назад

OpenFGA is an authorization/permission engine. Versions prior to version 0.2.4 are vulnerable to authorization bypass under certain conditions. Users whose model has a relation defined as a tupleset (the right hand side of a ‘from’ statement) that involves anything other than a direct relationship (e.g. ‘as self’) are vulnerable. Version 0.2.4 contains a patch for this issue.

EPSS

Процентиль: 56%
0.00334
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-285
CWE-863