cvelist/2022/23xxx/CVE-2022-23542.json

96 lines
3.3 KiB
JSON
Raw Normal View History

2022-01-19 22:01:34 +00:00
{
2022-12-20 21:00:37 +00:00
"data_version": "4.0",
2022-01-19 22:01:34 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2022-23542",
2022-12-20 21:00:37 +00:00
"ASSIGNER": "security-advisories@github.com",
"STATE": "PUBLIC"
2022-01-19 22:01:34 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2022-12-20 21:00:37 +00:00
"value": "OpenFGA is an authorization/permission engine built for developers and inspired by Google Zanzibar. During an internal security assessment, it was discovered that OpenFGA version 0.3.0 is vulnerable to authorization bypass under certain conditions. This issue has been patched in version 0.3.1 and is backward compatible."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-285: Improper Authorization",
"cweId": "CWE-285"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "openfga",
"product": {
"product_data": [
{
"product_name": "openfga",
"version": {
"version_data": [
{
"version_value": "= 0.3.0",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://github.com/openfga/openfga/security/advisories/GHSA-m3q4-7qmj-657m",
"refsource": "MISC",
"name": "https://github.com/openfga/openfga/security/advisories/GHSA-m3q4-7qmj-657m"
},
{
"url": "https://github.com/openfga/openfga/pull/422",
"refsource": "MISC",
"name": "https://github.com/openfga/openfga/pull/422"
},
{
"url": "https://github.com/openfga/openfga/releases/tag/v0.3.1",
"refsource": "MISC",
"name": "https://github.com/openfga/openfga/releases/tag/v0.3.1"
}
]
},
"source": {
"advisory": "GHSA-m3q4-7qmj-657m",
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
2022-01-19 22:01:34 +00:00
}
]
}
}