Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-jcf2-mxr2-gmqp: OpenFGA Authorization Bypass

Overview

Some end users of OpenFGA v1.3.0 or earlier are vulnerable to authorization bypass when calling the ListObjects API. UPDATE: This means that the API sometimes returns more objects than it should.

Am I Affected?

The vulnerability affects customers using ListObjects with specific models. The affected models contain expressions of type rel1 from type1.

Fix

Update to v1.3.1.

Backward Compatibility

This update is backward compatible.

ghsa
#vulnerability#git#auth
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2023-40579

OpenFGA Authorization Bypass

High severity GitHub Reviewed Published Aug 25, 2023 in openfga/openfga • Updated Aug 25, 2023

Package

gomod github.com/openfga/openfga (Go)

Affected versions

< 1.3.1

Overview

Some end users of OpenFGA v1.3.0 or earlier are vulnerable to authorization bypass when calling the ListObjects API. UPDATE: This means that the API sometimes returns more objects than it should.

Am I Affected?

The vulnerability affects customers using ListObjects with specific models. The affected models contain expressions of type rel1 from type1.

Fix

Update to v1.3.1.

Backward Compatibility

This update is backward compatible.

References

  • GHSA-jcf2-mxr2-gmqp
  • https://github.com/openfga/openfga/releases/tag/v1.3.1

Published to the GitHub Advisory Database

Aug 25, 2023

Last updated

Aug 25, 2023

Related news

CVE-2023-40579: OpenFGA Authorization Bypass

OpenFGA is an authorization/permission engine built for developers and inspired by Google Zanzibar. Some end users of OpenFGA v1.3.0 or earlier are vulnerable to authorization bypass when calling the ListObjects API. The vulnerability affects customers using `ListObjects` with specific models. The affected models contain expressions of type `rel1 from type1`. This issue has been patched in version 1.3.1.