Incorrect Permission Assignment for Critical Resource Affecting github.com/open-policy-agent/opa/loader package, versions <0.68.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMOPENPOLICYAGENTOPALOADER-7856111
  • published1 Sept 2024
  • disclosed30 Aug 2024
  • creditShelly Raban

Introduced: 30 Aug 2024

CVE-2024-8260  (opens in a new tab)
CWE-732  (opens in a new tab)

How to fix?

Upgrade github.com/open-policy-agent/opa/loader to version 0.68.0 or higher.

Overview

github.com/open-policy-agent/opa/loader is a general-purpose policy engine

Affected versions of this package are vulnerable to Incorrect Permission Assignment for Critical Resource due to the Rego.Load() and Rego.LoadBundle() functions accepting arbitrary UNC paths as arguments. An attacker who has gained access to these functions can pass in an SMB share location instead of a Rego file to the AsBundle() function in the loader, which may leak the Net-NTLMv2 hash of the current user.

Note: This vulnerability is only present on Windows.

CVSS Scores

version 4.0
version 3.1