Headline
GHSA-jcf2-mxr2-gmqp: OpenFGA Authorization Bypass
Overview
Some end users of OpenFGA v1.3.0 or earlier are vulnerable to authorization bypass when calling the ListObjects API. UPDATE: This means that the API sometimes returns more objects than it should.
Am I Affected?
The vulnerability affects customers using ListObjects
with specific models. The affected models contain expressions of type rel1 from type1
.
Fix
Update to v1.3.1.
Backward Compatibility
This update is backward compatible.
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2023-40579
OpenFGA Authorization Bypass
High severity GitHub Reviewed Published Aug 25, 2023 in openfga/openfga • Updated Aug 25, 2023
Package
gomod github.com/openfga/openfga (Go)
Affected versions
< 1.3.1
Overview
Some end users of OpenFGA v1.3.0 or earlier are vulnerable to authorization bypass when calling the ListObjects API. UPDATE: This means that the API sometimes returns more objects than it should.
Am I Affected?
The vulnerability affects customers using ListObjects with specific models. The affected models contain expressions of type rel1 from type1.
Fix
Update to v1.3.1.
Backward Compatibility
This update is backward compatible.
References
- GHSA-jcf2-mxr2-gmqp
- https://github.com/openfga/openfga/releases/tag/v1.3.1
Published to the GitHub Advisory Database
Aug 25, 2023
Last updated
Aug 25, 2023
Related news
OpenFGA is an authorization/permission engine built for developers and inspired by Google Zanzibar. Some end users of OpenFGA v1.3.0 or earlier are vulnerable to authorization bypass when calling the ListObjects API. The vulnerability affects customers using `ListObjects` with specific models. The affected models contain expressions of type `rel1 from type1`. This issue has been patched in version 1.3.1.