Miggo Logo

CVE-2022-23542: OpenFGA Authorization Bypass

N/A

CVSS Score

Basic Information

EPSS Score
0.07821%
Published
12/20/2022
Updated
1/29/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/openfga/openfgago= 0.3.00.3.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing type restriction filters in relationship lookup functions. The GitHub PR #422 fix shows these functions were modified to add 'filter by allowed object type' logic. In v0.3.0, when checking relationships, these functions would return tuples valid under previous model versions without validating against current type restrictions, enabling authorization bypass when models were updated. The direct correlation between the vulnerability description (legacy tuples being honored after type restriction changes) and the patched code locations confirms these functions' role.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Ov*rvi*w *urin* our int*rn*l s**urity *ss*ssm*nt, it w*s *is*ov*r** t**t Op*n*** v*rsions v*.*.* is vuln*r**l* to *ut*oriz*tion *yp*ss un**r **rt*in *on*itions. ### *m I *****t**? You *r* *****t** *y t*is vuln*r**ility i* ***ll** o* t** *ollowin

Reasoning

T** vuln*r**ility st*ms *rom missin* typ* r*stri*tion *ilt*rs in r*l*tions*ip lookup *un*tions. T** *it*u* PR #*** *ix s*ows t**s* *un*tions w*r* mo*i*i** to *** '*ilt*r *y *llow** o*j**t typ*' lo*i*. In v*.*.*, w**n ****kin* r*l*tions*ips, t**s* *un