OpenFGA is an authorization/permission engine. Versions prior to version 0.2.4 are vulnerable to authorization bypass under certain conditions. Users whose model has a relation defined as a tupleset (the right hand side of a ‘from’ statement) that involves anything other than a direct relationship (e.g. ‘as self’) are vulnerable. Version 0.2.4 contains a patch for this issue.
References
Link | Resource |
---|---|
https://github.com/openfga/openfga/security/advisories/GHSA-f4mm-2r69-mg5f | Third Party Advisory |
https://github.com/openfga/openfga/commit/c8db1ee3d2a366f18e585dd33236340e76e784c4 | Patch Third Party Advisory |
https://github.com/openfga/openfga/releases/tag/v0.2.4 | Release Notes Third Party Advisory |
Configurations
Information
Published : 2022-10-25 10:15
Updated : 2022-10-25 17:52
NVD link : CVE-2022-39342
Mitre link : CVE-2022-39342
JSON object : View
CWE
CWE-863
Incorrect Authorization
Products Affected
openfga
- openfga