You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
OPenFGA is an open source authorization/permission engine built for developers. OpenFGA versions v1.1.0 and prior are vulnerable to a DoS attack when Check and ListObjects calls are executed against authorization models that contain circular relationship definitions. Users are affected by this vulnerability if they are using OpenFGA v1.1.0 or earlier, and if you are executing Check or ListObjects calls against a vulnerable authorization model. Users are advised to upgrade to version 1.1.1. There are no known workarounds for this vulnerability. Users that do not have circular relationships in their models are not affected.
See doc/triage.md for instructions on how to triage this report.
modules:
- module: github.com/openfga/openfga
packages:
- package: openfga
description: |-
OPenFGA is an open source authorization/permission engine built for developers.
OpenFGA versions v1.1.0 and prior are vulnerable to a DoS attack when Check and
ListObjects calls are executed against authorization models that contain
circular relationship definitions. Users are affected by this vulnerability if
they are using OpenFGA v1.1.0 or earlier, and if you are executing `Check` or
`ListObjects` calls against a vulnerable authorization model. Users are advised
to upgrade to version 1.1.1. There are no known workarounds for this
vulnerability. Users that do not have circular relationships in their models are
not affected.
cves:
- CVE-2023-35933
references:
- advisory: https://github.com/openfga/openfga/security/advisories/GHSA-hr9r-8phq-5x8j
- fix: https://github.com/openfga/openfga/commit/087ce392595f3c319ab3028b5089118ea4063452
- web: https://openfga.dev/api/service#/Relationship%20Queries/Check
- web: https://openfga.dev/api/service#/Relationship%20Queries/ListObjects
The text was updated successfully, but these errors were encountered:
CVE-2023-35933 references github.com/openfga/openfga, which may be a Go module.
Description:
OPenFGA is an open source authorization/permission engine built for developers. OpenFGA versions v1.1.0 and prior are vulnerable to a DoS attack when Check and ListObjects calls are executed against authorization models that contain circular relationship definitions. Users are affected by this vulnerability if they are using OpenFGA v1.1.0 or earlier, and if you are executing
Check
orListObjects
calls against a vulnerable authorization model. Users are advised to upgrade to version 1.1.1. There are no known workarounds for this vulnerability. Users that do not have circular relationships in their models are not affected.References:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: