Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vj4m-83m8-xpw5

Опубликовано: 25 окт. 2022
Источник: github
Github: Прошло ревью
CVSS3: 5.9

Описание

OpenFGA Authorization Bypass via tupleset wildcard

Overview

During our internal security assessment, it was discovered that OpenFGA versions v0.2.3 and prior are vulnerable to authorization bypass under certain conditions.

Am I affected?

You are affected by this vulnerability if you are using openfga/openfga version v0.2.3 and you added a tuple with a wildcard (*) assigned to a tupleset relation (the right hand side of a ‘from’ statement).

How to fix that?

Upgrade to version v0.2.4.

Backward Compatibility

This update is not backward compatible with any authorization model that uses wildcard on a tupleset relation.

Пакеты

Наименование

github.com/openfga/openfga

go
Затронутые версииВерсия исправления

<= 0.2.3

0.2.4

EPSS

Процентиль: 56%
0.00334
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-285
CWE-863

Связанные уязвимости

CVSS3: 5.9
nvd
больше 3 лет назад

OpenFGA is an authorization/permission engine. Versions prior to version 0.2.4 are vulnerable to authorization bypass under certain conditions. Users who have wildcard (`*`) defined on tupleset relations in their authorization model are vulnerable. Version 0.2.4 contains a patch for this issue.

EPSS

Процентиль: 56%
0.00334
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-285
CWE-863