Exploit maturity not defined.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Incorrect Authorization vulnerabilities in an interactive lesson.
Start learningUpgrade github.com/openfga/openfga/pkg/server/commands/reverseexpand
to version 1.8.5 or higher.
Affected versions of this package are vulnerable to Incorrect Authorization in the shouldCheckPublicAssignable()
function used by Check and List Object API requests. A user can bypass authorization controls by manipulating the inputs to these endpoints.
All of the following conditions must be met for an application to be vulnerable:
Check or ListObjects are called with a model that has a relation that is directly assignable to both public access AND userset with the same type.
A type-bound public access tuple is assigned to an object.
A userset
tuple is not assigned to the same object.
The Check request's user
field is a userset
that has the same type as the type-bound public access tuple's user type