7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.001 Low
EPSS
Percentile
44.5%
OpenFGA versions v1.1.0 and prior are vulnerable to a DoS attack when certain Check and ListObjects calls are executed against authorization models that contain circular relationship definitions.
You are affected by this vulnerability if you are using OpenFGA v1.1.0 or earlier, and if you are executing certain Check or ListObjects calls against a vulnerable authorization model. To see which of your models could be vulnerable to this attack, download OpenFGA v1.2.0 and run the following command:
./openfga validate-models --datastore-engine <ENGINE> --datastore-uri <URI> | jq .[] | select(.Error | contains("loop"))
replacing the variables <ENGINE>
and <URI>
as needed.
Upgrade to v1.1.1.
If you are not passing an invalid authorization model (as identified by running ./openfga validate-models
) as a parameter of your Check and ListObjects calls, this upgrade is backwards compatible.
Otherwise, OpenFGA v1.1.1 will start returning HTTP 400 status codes on those calls.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/openfga/openfga | lt | 1.1.1 |
github.com/advisories/GHSA-hr9r-8phq-5x8j
github.com/openfga/openfga/commit/087ce392595f3c319ab3028b5089118ea4063452
github.com/openfga/openfga/security/advisories/GHSA-hr9r-8phq-5x8j
nvd.nist.gov/vuln/detail/CVE-2023-35933
openfga.dev/api/service#/Relationship%20Queries/Check
openfga.dev/api/service#/Relationship%20Queries/ListObjects