Incorrect Permission Assignment for Critical Resource Affecting github.com/open-policy-agent/opa/loader package, versions <0.68.0
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMOPENPOLICYAGENTOPALOADER-7856111
- published 1 Sep 2024
- disclosed 30 Aug 2024
- credit Shelly Raban
Introduced: 30 Aug 2024
CVE-2024-8260 Open this link in a new tabHow to fix?
Upgrade github.com/open-policy-agent/opa/loader
to version 0.68.0 or higher.
Overview
github.com/open-policy-agent/opa/loader is a general-purpose policy engine
Affected versions of this package are vulnerable to Incorrect Permission Assignment for Critical Resource due to the Rego.Load()
and Rego.LoadBundle()
functions accepting arbitrary UNC paths as arguments. An attacker who has gained access to these functions can pass in an SMB share location instead of a Rego file to the AsBundle()
function in the loader, which may leak the Net-NTLMv2 hash of the current user.
Note: This vulnerability is only present on Windows.