CVE-2022-36085

Open Policy Agent (OPA) is an open source, general-purpose policy engine. The Rego compiler provides a (deprecated) `WithUnsafeBuiltins` function, which allows users to provide a set of built-in functions that should be deemed unsafe — and as such rejected — by the compiler if encountered in the policy compilation stage. A bypass of this protection has been found, where the use of the `with` keyword to mock such a built-in function (a feature introduced in OPA v0.40.0), isn’t taken into account by `WithUnsafeBuiltins`. Multiple conditions need to be met in order to create an adverse effect. Version 0.43.1 contains a patch for this issue. As a workaround, avoid using the `WithUnsafeBuiltins` function and use the `capabilities` feature instead.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openpolicyagent:open_policy_agent:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:12

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 7.4
References () https://github.com/open-policy-agent/opa/commit/25a597bc3f4985162e7f65f9c36599f4f8f55823 - Patch, Third Party Advisory () https://github.com/open-policy-agent/opa/commit/25a597bc3f4985162e7f65f9c36599f4f8f55823 - Patch, Third Party Advisory
References () https://github.com/open-policy-agent/opa/commit/3e8c754ed007b22393cf65e48751ad9f6457fee8 - Patch, Third Party Advisory () https://github.com/open-policy-agent/opa/commit/3e8c754ed007b22393cf65e48751ad9f6457fee8 - Patch, Third Party Advisory
References () https://github.com/open-policy-agent/opa/pull/4540 - Exploit, Patch, Third Party Advisory () https://github.com/open-policy-agent/opa/pull/4540 - Exploit, Patch, Third Party Advisory
References () https://github.com/open-policy-agent/opa/pull/4616 - Exploit, Patch, Third Party Advisory () https://github.com/open-policy-agent/opa/pull/4616 - Exploit, Patch, Third Party Advisory
References () https://github.com/open-policy-agent/opa/releases/tag/v0.43.1 - Third Party Advisory () https://github.com/open-policy-agent/opa/releases/tag/v0.43.1 - Third Party Advisory
References () https://github.com/open-policy-agent/opa/security/advisories/GHSA-f524-rf33-2jjr - Exploit, Patch, Third Party Advisory () https://github.com/open-policy-agent/opa/security/advisories/GHSA-f524-rf33-2jjr - Exploit, Patch, Third Party Advisory

07 Nov 2023, 03:49

Type Values Removed Values Added
Summary Open Policy Agent (OPA) is an open source, general-purpose policy engine. The Rego compiler provides a (deprecated) `WithUnsafeBuiltins` function, which allows users to provide a set of built-in functions that should be deemed unsafe — and as such rejected — by the compiler if encountered in the policy compilation stage. A bypass of this protection has been found, where the use of the `with` keyword to mock such a built-in function (a feature introduced in OPA v0.40.0), isn’t taken into account by `WithUnsafeBuiltins`. Multiple conditions need to be met in order to create an adverse effect. Version 0.43.1 contains a patch for this issue. As a workaround, avoid using the `WithUnsafeBuiltins` function and use the `capabilities` feature instead. Open Policy Agent (OPA) is an open source, general-purpose policy engine. The Rego compiler provides a (deprecated) `WithUnsafeBuiltins` function, which allows users to provide a set of built-in functions that should be deemed unsafe — and as such rejected — by the compiler if encountered in the policy compilation stage. A bypass of this protection has been found, where the use of the `with` keyword to mock such a built-in function (a feature introduced in OPA v0.40.0), isn’t taken into account by `WithUnsafeBuiltins`. Multiple conditions need to be met in order to create an adverse effect. Version 0.43.1 contains a patch for this issue. As a workaround, avoid using the `WithUnsafeBuiltins` function and use the `capabilities` feature instead.

Information

Published : 2022-09-08 14:15

Updated : 2024-11-21 07:12


NVD link : CVE-2022-36085

Mitre link : CVE-2022-36085

CVE.ORG link : CVE-2022-36085


JSON object : View

Products Affected

openpolicyagent

  • open_policy_agent
CWE
CWE-20

Improper Input Validation

CWE-693

Protection Mechanism Failure

NVD-CWE-noinfo