Lucene search

K
githubGitHub Advisory DatabaseGHSA-8CPH-M685-6V6R
HistoryApr 16, 2024 - 10:57 p.m.

OpenFGA Authorization Bypass

2024-04-1622:57:58
CWE-285
CWE-863
GitHub Advisory Database
github.com
9
openfga
authorization bypass
version 1.5.0
check api
listobjects api
exclusion
intersection
cyclical relationships
update 1.5.3
backward compatible

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Overview

Some end users of OpenFGA v1.5.0 or later are vulnerable to authorization bypass when calling Check or ListObjects APIs.

Am I Affected?

You are very likely affected if your model involves exclusion (e.g. a but not b) or intersection (e.g. a and b) and you have any cyclical relationships. If you are using these, please update as soon as possible.

Fix

Update to v1.5.3

Backward Compatibility

This update is backward compatible.

Affected configurations

Vulners
Node
openfgaopenfgaRange<1.5.3
CPENameOperatorVersion
github.com/openfga/openfgalt1.5.3

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for GHSA-8CPH-M685-6V6R