CVE-2023-35933
Summary
| CVE | CVE-2023-35933 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-06-26 20:15:00 UTC |
| Updated | 2023-07-06 18:13:00 UTC |
| Description | OPenFGA is an open source authorization/permission engine built for developers. OpenFGA versions v1.1.0 and prior are vulnerable to a DoS attack when Check and ListObjects calls are executed against authorization models that contain circular relationship definitions. Users are affected by this vulnerability if they are using OpenFGA v1.1.0 or earlier, and if you are executing `Check` or `ListObjects` calls against a vulnerable authorization model. Users are advised to upgrade to version 1.1.1. There are no known workarounds for this vulnerability. Users that do not have circular relationships in their models are not affected. |
Risk And Classification
Problem Types: CWE-835
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Open FGA API Explorer | OpenFGA | MISC | openfga.dev | |
| OpenFGA DoS · Advisory · openfga/openfga · GitHub | MISC | github.com | |
| Merge pull request from GHSA-hr9r-8phq-5x8j · openfga/openfga@087ce39 · GitHub | MISC | github.com | |
| Open FGA API Explorer | OpenFGA | MISC | openfga.dev | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.