GHSA-9pc8-m4vp-ggvf

Suggest an improvement
Source
https://github.com/advisories/GHSA-9pc8-m4vp-ggvf
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-9pc8-m4vp-ggvf/GHSA-9pc8-m4vp-ggvf.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-9pc8-m4vp-ggvf
Aliases
Related
Published
2023-10-19T17:05:16Z
Modified
2024-08-21T14:56:49.098837Z
Severity
  • 3.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Artifact Hub allows unsafe rego built-in
Details

Impact

During a security audit of Artifact Hub's code base, a security researcher at OffSec identified a bug in which a default unsafe rego built-in was allowed to be used when defining authorization policies.

Artifact Hub includes a fine-grained authorization mechanism that allows organizations to define what actions can be performed by their members. It is based on customizable authorization policies that are enforced by the Open Policy Agent. Policies are written using rego and their data files are expected to be json documents. By default, rego allows policies to make HTTP requests, which can be abused to send requests to internal resources and forward the responses to an external entity. In the context of Artifact Hub, this capability should have been disabled.

Patches

This issue has been resolved in version 1.16.0.

Database specific
{
    "nvd_published_at": "2023-10-19T21:15:08Z",
    "cwe_ids": [
        "CWE-918"
    ],
    "severity": "LOW",
    "github_reviewed": true,
    "github_reviewed_at": "2023-10-19T17:05:16Z"
}
References

Affected packages

Go / github.com/artifacthub/hub

Package

Name
github.com/artifacthub/hub
View open source insights on deps.dev
Purl
pkg:golang/github.com/artifacthub/hub

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.16.0