OpenFGA is a high-performance authorization/permission engine inspired by Google Zanzibar. Versions prior to 0.2.5 are vulnerable to authorization bypass under certain conditions. You are affected by this vulnerability if you added a tuple with a wildcard (*) assigned to a tupleset relation (the right hand side of a ‘from’ statement). This issue has been patched in version v0.2.5. This update is not backward compatible with any authorization model that uses wildcard on a tupleset relation.
References
Link | Resource |
---|---|
https://github.com/openfga/openfga/security/advisories/GHSA-3gfj-fxx4-f22w | Third Party Advisory |
https://github.com/openfga/openfga/security/advisories/GHSA-3gfj-fxx4-f22w | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/openfga/openfga/security/advisories/GHSA-3gfj-fxx4-f22w - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.8 |
07 Nov 2023, 03:50
Type | Values Removed | Values Added |
---|---|---|
Summary | OpenFGA is a high-performance authorization/permission engine inspired by Google Zanzibar. Versions prior to 0.2.5 are vulnerable to authorization bypass under certain conditions. You are affected by this vulnerability if you added a tuple with a wildcard (*) assigned to a tupleset relation (the right hand side of a ‘from’ statement). This issue has been patched in version v0.2.5. This update is not backward compatible with any authorization model that uses wildcard on a tupleset relation. |
Information
Published : 2022-11-08 08:15
Updated : 2024-11-21 07:18
NVD link : CVE-2022-39352
Mitre link : CVE-2022-39352
CVE.ORG link : CVE-2022-39352
JSON object : View
Products Affected
openfga
- openfga
CWE
CWE-863
Incorrect Authorization