Lucene search

K
githubGitHub Advisory DatabaseGHSA-3GFJ-FXX4-F22W
HistoryNov 08, 2022 - 10:31 p.m.

OpenFGA Authorization Bypass

2022-11-0822:31:25
CWE-863
GitHub Advisory Database
github.com
17
openfga
authorization bypass
vulnerable
version 0.2.4
fix
upgrade
backward compatibility

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

57.3%

Overview

During our internal security assessment, it was discovered that OpenFGA versions v0.2.4 and prior are vulnerable to authorization bypass under certain conditions.

Am I Affected?

You are affected by this vulnerability if you are using openfga/openfga version v0.2.4 or prior, and have tuples where the user field is set to a userset e.g. folder:test#owner, and the tuple’s relation is used on the right-hand side of a from statement.

How to fix that?

Upgrade to version 0.2.5.

Backward Compatibility

This update is not backward compatible.
Any tuples where the user field is set to a userset, and the tuple’s relation is used on the right-hand side of a from statement have to be rewritten.

Affected configurations

Vulners
Node
openfgaopenfgaRange0.2.4
VendorProductVersionCPE
openfgaopenfga*cpe:2.3:a:openfga:openfga:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

57.3%

Related for GHSA-3GFJ-FXX4-F22W