Overview
OpenFGA v1.3.8 to v1.8.2 (Helm chart openfga-0.1.38 to openfga-0.2.19, docker v1.3.8 to v.1.8.2) are vulnerable to authorization bypass when certain Check and ListObject calls are executed.
Am I Affected?
You are affected by this authorization bypass vulnerability if you are using OpenFGA v1.3.8 to v1.8.2, specifically under the following conditions:
- Calling Check API or ListObjects with a model that uses conditions, and
- OpenFGA is configured with caching enabled (
OPENFGA_CHECK_QUERY_CACHE_ENABLED
), and
- Check API call or ListObjects API calls contain contextual tuples that include conditions.
Fix
Upgrade to v1.8.3. This upgrade is backwards compatible.
References
Overview
OpenFGA v1.3.8 to v1.8.2 (Helm chart openfga-0.1.38 to openfga-0.2.19, docker v1.3.8 to v.1.8.2) are vulnerable to authorization bypass when certain Check and ListObject calls are executed.
Am I Affected?
You are affected by this authorization bypass vulnerability if you are using OpenFGA v1.3.8 to v1.8.2, specifically under the following conditions:
OPENFGA_CHECK_QUERY_CACHE_ENABLED
), andFix
Upgrade to v1.8.3. This upgrade is backwards compatible.
References