Lucene search

K
githubGitHub Advisory DatabaseGHSA-C77R-FH37-X2PX
HistoryAug 30, 2024 - 3:31 p.m.

OPA for Windows has an SMB force-authentication vulnerability

2024-08-3015:31:30
CWE-294
GitHub Advisory Database
github.com
2
opa
windows
smb
force-authentication
vulnerability
input validation
opa cli
opa go library
software

CVSS3

7.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

High

A SMB force-authentication vulnerability exists in all versions of OPA for Windows prior to v0.68.0. The vulnerability exists because of improper input validation, allowing a user to pass an arbitrary SMB share instead of a Rego file as an argument to OPA CLI or to one of the OPA Go library’s functions.

Affected configurations

Vulners
Node
open-policy-agentopaRange<0.68.0
VendorProductVersionCPE
open-policy-agentopa*cpe:2.3:a:open-policy-agent:opa:*:*:*:*:*:*:*:*

CVSS3

7.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

High