Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

github.com/open-policy-agent/opa: CVE-2022-36085 #2880

Closed
github-actions bot opened this issue Sep 15, 2022 · 1 comment
Closed

github.com/open-policy-agent/opa: CVE-2022-36085 #2880

github-actions bot opened this issue Sep 15, 2022 · 1 comment
Assignees
Labels
kind/security Categorizes issue or PR as related to Trivy's own security or internal vulnerabilities.

Comments

@github-actions
Copy link

Title

open-policy-agent: Compiler Bypass of WithUnsafeBuiltins using "with" keyword to mock functions

Description

Open Policy Agent (OPA) is an open source, general-purpose policy engine. The Rego compiler provides a (deprecated) WithUnsafeBuiltins function, which allows users to provide a set of built-in functions that should be deemed unsafe — and as such rejected — by the compiler if encountered in the policy compilation stage. A bypass of this protection has been found, where the use of the with keyword to mock such a built-in function (a feature introduced in OPA v0.40.0), isn’t taken into account by WithUnsafeBuiltins. Multiple conditions need to be met in order to create an adverse effect. Version 0.43.1 contains a patch for this issue. As a workaround, avoid using the WithUnsafeBuiltins function and use the capabilities feature instead.

Severity

CRITICAL

Primary URL

https://avd.aquasec.com/nvd/cve-2022-36085

References

@github-actions github-actions bot added the kind/security Categorizes issue or PR as related to Trivy's own security or internal vulnerabilities. label Sep 15, 2022
@knqyf263
Copy link
Collaborator

Fixed in 047a0b3

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/security Categorizes issue or PR as related to Trivy's own security or internal vulnerabilities.
Projects
None yet
Development

No branches or pull requests

1 participant