CVE-2022-36085

HIGH

OPA <0.40.0 - Code Injection

Title source: llm

Description

Open Policy Agent (OPA) is an open source, general-purpose policy engine. The Rego compiler provides a (deprecated) `WithUnsafeBuiltins` function, which allows users to provide a set of built-in functions that should be deemed unsafe — and as such rejected — by the compiler if encountered in the policy compilation stage. A bypass of this protection has been found, where the use of the `with` keyword to mock such a built-in function (a feature introduced in OPA v0.40.0), isn’t taken into account by `WithUnsafeBuiltins`. Multiple conditions need to be met in order to create an adverse effect. Version 0.43.1 contains a patch for this issue. As a workaround, avoid using the `WithUnsafeBuiltins` function and use the `capabilities` feature instead.

Scores

CVSS v3 7.4
EPSS 0.0136
EPSS Percentile 80.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Classification

CWE
CWE-20 CWE-693
Status published

Affected Products (2)

openpolicyagent/open_policy_agent < 0.43.1
open-policy-agent/opa < 0.43.1Go

Timeline

Published Sep 08, 2022
Tracked Since Feb 18, 2026