-
Notifications
You must be signed in to change notification settings - Fork 67
x/vulndb: potential Go vuln in github.com/openfga/openfga: GHSA-3f6g-m4hr-59h8 #3061
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Labels
Comments
Change https://go.dev/cl/605315 mentions this issue: |
Change https://go.dev/cl/604940 mentions this issue: |
gopherbot
pushed a commit
that referenced
this issue
Aug 15, 2024
Re-generate report to pull in new info. - data/reports/GO-2024-3061.yaml Updates #3061 Fixes #3069 Change-Id: I9376ccb1ed634dd6c0e93d7bccdcb7c2caf2caed Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/604940 Auto-Submit: Tatiana Bradley <tatianabradley@google.com> Reviewed-by: Damien Neil <dneil@google.com> LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
This was referenced Jan 13, 2025
This was referenced Feb 19, 2025
This was referenced Apr 30, 2025
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Advisory GHSA-3f6g-m4hr-59h8 references a vulnerability in the following Go modules:
Description:
Overview
OpenFGA v1.5.7 and v1.5.8 are vulnerable to authorization bypass when calling Check API with a model that uses
but not
andfrom
expressions and a userset.Fix
Downgrade to v1.5.6 as soon as possible. This downgrade is backward compatible.
We are currently working on a fix which will be included in the next release.
References:
Cross references:
See doc/quickstart.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: