Lucene search

K
githubGitHub Advisory DatabaseGHSA-F4MM-2R69-MG5F
HistoryOct 25, 2022 - 8:21 p.m.

OpenFGA Authorization Bypass

2022-10-2520:21:33
CWE-285
CWE-863
GitHub Advisory Database
github.com
15
openfga
authorization bypass
vulnerability
upgrade
backward compatibility
security assessment

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

59.3%

Overview

During our internal security assessment, it was discovered that OpenFGA versions v0.2.3 and prior are vulnerable to authorization bypass under certain conditions.

Am I Affected?

You are affected by this vulnerability if you are using openfga/openfga version v0.2.3 or prior, and your model has a relation defined as a tupleset (the right hand side of a β€˜from’ statement) that involves anything other than a direct relationship (e.g. β€˜as self’)

How to fix that?

Upgrade to version v0.2.4.

Backward Compatibility

This update is not backward compatible.
Any model involving rewritten tupleset relations will no longer be acceptable and has to be modified.

Affected configurations

Vulners
Node
openfgaopenfgaRange≀0.2.3
VendorProductVersionCPE
openfgaopenfga*cpe:2.3:a:openfga:openfga:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

59.3%

Related for GHSA-F4MM-2R69-MG5F