CVE-2022-36085

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-36085
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-36085.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-36085
Aliases
Published
2022-09-08T13:30:16Z
Modified
2025-10-22T18:32:46.997031Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
OPA Compiler: Bypass of WithUnsafeBuiltins using `with` keyword to mock functions
Details

Open Policy Agent (OPA) is an open source, general-purpose policy engine. The Rego compiler provides a (deprecated) WithUnsafeBuiltins function, which allows users to provide a set of built-in functions that should be deemed unsafe — and as such rejected — by the compiler if encountered in the policy compilation stage. A bypass of this protection has been found, where the use of the with keyword to mock such a built-in function (a feature introduced in OPA v0.40.0), isn’t taken into account by WithUnsafeBuiltins. Multiple conditions need to be met in order to create an adverse effect. Version 0.43.1 contains a patch for this issue. As a workaround, avoid using the WithUnsafeBuiltins function and use the capabilities feature instead.

Database specific
{
    "cwe_ids": [
        "CWE-20",
        "CWE-693"
    ]
}
References

Affected packages

Git / github.com/open-policy-agent/opa

Affected ranges

Type
GIT
Repo
https://github.com/open-policy-agent/opa
Events

Affected versions

v0.*

v0.40.0
v0.41.0
v0.42.0
v0.43.0