OpenFGA is a high-performance authorization/permission engine inspired by Google Zanzibar. Versions prior to 0.2.5 are vulnerable to authorization bypass under certain conditions. You are affected by this vulnerability if you added a tuple with a wildcard (*) assigned to a tupleset relation (the right hand side of a ‘from’ statement). This issue has been patched in version v0.2.5. This update is not backward compatible with any authorization model that uses wildcard on a tupleset relation.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/openfga/openfga/security/advisories/GHSA-3gfj-fxx4-f22w | Third Party Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2022-11-08 08:15
Updated : 2023-11-07 03:50
NVD link : CVE-2022-39352
Mitre link : CVE-2022-39352
CVE.ORG link : CVE-2022-39352
JSON object : View
Products Affected
                openfga
- openfga
 
CWE
                
                    
                        
                        CWE-863
                        
            Incorrect Authorization
