GHSA-8cph-m685-6v6r

Suggest an improvement
Source
https://github.com/advisories/GHSA-8cph-m685-6v6r
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-8cph-m685-6v6r/GHSA-8cph-m685-6v6r.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8cph-m685-6v6r
Aliases
Related
Published
2024-04-16T22:57:58Z
Modified
2024-06-04T16:56:42.446963Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
OpenFGA Authorization Bypass
Details

Overview

Some end users of OpenFGA v1.5.0 or later are vulnerable to authorization bypass when calling Check or ListObjects APIs.

Am I Affected?

You are very likely affected if your model involves exclusion (e.g. a but not b) or intersection (e.g. a and b) and you have any cyclical relationships. If you are using these, please update as soon as possible.

Fix

Update to v1.5.3

Backward Compatibility

This update is backward compatible.

Database specific
{
    "nvd_published_at": "2024-04-16T22:15:35Z",
    "cwe_ids": [
        "CWE-285",
        "CWE-863"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-04-16T22:57:58Z"
}
References

Affected packages

Go / github.com/openfga/openfga

Package

Name
github.com/openfga/openfga
View open source insights on deps.dev
Purl
pkg:golang/github.com/openfga/openfga

Affected ranges

Type
SEMVER
Events
Introduced
1.5.0
Fixed
1.5.3