Lucene search

K
githubGitHub Advisory DatabaseGHSA-VJ4M-83M8-XPW5
HistoryOct 25, 2022 - 8:21 p.m.

OpenFGA Authorization Bypass via tupleset wildcard

2022-10-2520:21:45
CWE-285
CWE-863
GitHub Advisory Database
github.com
14
openfga
authorization bypass
tupleset
wildcard
vulnerability
version v0.2.3
upgrade

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

59.4%

Overview

During our internal security assessment, it was discovered that OpenFGA versions v0.2.3 and prior are vulnerable to authorization bypass under certain conditions.

Am I affected?

You are affected by this vulnerability if you are using openfga/openfga version v0.2.3 and you added a tuple with a wildcard (*) assigned to a tupleset relation (the right hand side of a β€˜from’ statement).

How to fix that?

Upgrade to version v0.2.4.

Backward Compatibility

This update is not backward compatible with any authorization model that uses wildcard on a tupleset relation.

Affected configurations

Vulners
Node
openfgaopenfgaRange≀0.2.3
CPENameOperatorVersion
github.com/openfga/openfgale0.2.3

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

59.4%

Related for GHSA-VJ4M-83M8-XPW5