OpenFGA is a high-performance and flexible authorization/permission engine. Some end users of OpenFGA v1.5.0 or later are vulnerable to authorization bypass when calling Check or ListObjects APIs. You are very likely affected if your model involves exclusion (e.g. `a but not b`) or intersection (e.g. `a and b`). This vulnerability is fixed in v1.5.3.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1156 | OpenFGA is a high-performance and flexible authorization/permission engine. Some end users of OpenFGA v1.5.0 or later are vulnerable to authorization bypass when calling Check or ListObjects APIs. You are very likely affected if your model involves exclusion (e.g. `a but not b`) or intersection (e.g. `a and b`). This vulnerability is fixed in v1.5.3. |
Github GHSA |
GHSA-8cph-m685-6v6r | OpenFGA Authorization Bypass |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T01:52:56.950Z
Reserved: 2024-04-03T17:55:32.646Z
Link: CVE-2024-31452
Updated: 2024-05-30T15:46:29.475Z
Status : Awaiting Analysis
Published: 2024-04-16T22:15:35.003
Modified: 2024-11-21T09:13:32.933
Link: CVE-2024-31452
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA