You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
Open Policy Agent (OPA) is an open source, general-purpose policy engine. The Rego compiler provides a (deprecated) WithUnsafeBuiltins function, which allows users to provide a set of built-in functions that should be deemed unsafe — and as such rejected — by the compiler if encountered in the policy compilation stage. A bypass of this protection has been found, where the use of the with keyword to mock such a built-in function (a feature introduced in OPA v0.40.0), isn’t taken into account by WithUnsafeBuiltins. Multiple conditions need to be met in order to create an adverse effect. Version 0.43.1 contains a patch for this issue. As a workaround, avoid using the WithUnsafeBuiltins function and use the capabilities feature instead.
See doc/triage.md for instructions on how to triage this report.
modules:
- module: github.com/open-policy-agent/opa
packages:
- package: opa
description: |
Open Policy Agent (OPA) is an open source, general-purpose policy engine. The Rego compiler provides a (deprecated) `WithUnsafeBuiltins` function, which allows users to provide a set of built-in functions that should be deemed unsafe — and as such rejected — by the compiler if encountered in the policy compilation stage. A bypass of this protection has been found, where the use of the `with` keyword to mock such a built-in function (a feature introduced in OPA v0.40.0), isn’t taken into account by `WithUnsafeBuiltins`. Multiple conditions need to be met in order to create an adverse effect. Version 0.43.1 contains a patch for this issue. As a workaround, avoid using the `WithUnsafeBuiltins` function and use the `capabilities` feature instead.
cves:
- CVE-2022-36085
references:
- web: https://github.com/open-policy-agent/opa/security/advisories/GHSA-f524-rf33-2jjr
- fix: https://github.com/open-policy-agent/opa/pull/4540
- fix: https://github.com/open-policy-agent/opa/pull/4616
- fix: https://github.com/open-policy-agent/opa/commit/25a597bc3f4985162e7f65f9c36599f4f8f55823
- fix: https://github.com/open-policy-agent/opa/commit/3e8c754ed007b22393cf65e48751ad9f6457fee8
- web: https://github.com/open-policy-agent/opa/releases/tag/v0.43.1
The text was updated successfully, but these errors were encountered:
CVE-2022-36085 references github.com/open-policy-agent/opa, which may be a Go module.
Description:
Open Policy Agent (OPA) is an open source, general-purpose policy engine. The Rego compiler provides a (deprecated)
WithUnsafeBuiltins
function, which allows users to provide a set of built-in functions that should be deemed unsafe — and as such rejected — by the compiler if encountered in the policy compilation stage. A bypass of this protection has been found, where the use of thewith
keyword to mock such a built-in function (a feature introduced in OPA v0.40.0), isn’t taken into account byWithUnsafeBuiltins
. Multiple conditions need to be met in order to create an adverse effect. Version 0.43.1 contains a patch for this issue. As a workaround, avoid using theWithUnsafeBuiltins
function and use thecapabilities
feature instead.References:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: