In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Incorrect Authorization vulnerabilities in an interactive lesson.
Start learningUpgrade github.com/open-policy-agent/opa/v1/server
to version 1.4.0 or higher.
Affected versions of this package are vulnerable to Incorrect Authorization via the HTTP Data API. An attacker can manipulate the Rego code within the query to either cause the server to perform unintended actions or to consume excessive resources, leading to a Denial of Service (DoS).
Note:
This is only exploitable if all of these conditions are met:
OPA is deployed as a standalone server (rather than being used as a Go library);
Network access to OPA's RESTful APIs is not restricted to localhost
or trusted networks.
The configured authorization policy does not do exact matching of the input.path
attribute when deciding if the request should be allowed.