Improper Authorization Affecting github.com/openfga/openfga/internal/graph package, versions >=1.5.7 <=1.5.8


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.09% (41st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMOPENFGAOPENFGAINTERNALGRAPH-7675658
  • published 11 Aug 2024
  • disclosed 9 Aug 2024
  • credit Unknown

How to fix?

Upgrade github.com/openfga/openfga/internal/graph to version or higher.

Overview

Affected versions of this package are vulnerable to Improper Authorization due to the improper handling of but not and from expressions in the Check API. An attacker can bypass authorization controls by crafting specific requests using these expressions. Exploiting this vulnerability is possible if a model uses these expressions along with a userset.

References

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
8.7 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Attack Requirements (AT)
    None
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Confidentiality (VC)
    None
  • Integrity (VI)
    High
  • Availability (VA)
    None
  • Confidentiality (SC)
    None
  • Integrity (SI)
    None
  • Availability (SA)
    None