CVE-2024-46989 – Multiple caveats on resources of the same type can result in no permission when permission is expected
https://notcve.org/view.php?id=CVE-2024-46989
spicedb is an Open Source, Google Zanzibar-inspired permissions database to enable fine-grained authorization for customer applications. Multiple caveats over the same indirect subject type on the same relation can result in no permission being returned when permission is expected. If the resource has multiple groups, and each group is caveated, it is possible for the returned permission to be "no permission" when permission is expected. Permission is returned as NO_PERMISSION when PERMISSION is expected on the CheckPermission API. This issue has been addressed in release version 1.35.3. • https://github.com/authzed/spicedb/commit/d4ef8e1dbce1eafaf25847f4c0f09738820f5bf2 https://github.com/authzed/spicedb/security/advisories/GHSA-jhg6-6qrx-38mr • CWE-269: Improper Privilege Management •
CVE-2024-38361 – Permissions processing error in spacedb
https://notcve.org/view.php?id=CVE-2024-38361
Spicedb is an Open Source, Google Zanzibar-inspired permissions database to enable fine-grained authorization for customer applications. Use of an exclusion under an arrow that has multiple resources may resolve to `NO_PERMISSION` when permission is expected. If the resource exists under *multiple* folders and the user has access to view more than a single folder, SpiceDB may report the user does not have access due to a failure in the exclusion dispatcher to request that *all* the folders in which the user is a member be returned. Permission is returned as `NO_PERMISSION` when `PERMISSION` is expected on the `CheckPermission` API. This issue has been addressed in version 1.33.1. • https://github.com/authzed/spicedb/commit/ecef31d2b266fde17eb2c3415e2ec4ceff96fbeb https://github.com/authzed/spicedb/security/advisories/GHSA-grjv-gjgr-66g2 • CWE-281: Improper Preservation of Permissions •
CVE-2024-32001 – SpiceDB: LookupSubjects may return partial results if a specific kind of relation is used
https://notcve.org/view.php?id=CVE-2024-32001
SpiceDB is a graph database purpose-built for storing and evaluating access control data. Use of a relation of the form: `relation folder: folder | folder#parent` with an arrow such as `folder->view` can cause LookupSubjects to only return the subjects found under subjects for either `folder` or `folder#parent`. This bug only manifests if the same subject type is used multiple types in a relation, relationships exist for both subject types and an arrow is used over the relation. Any user making a negative authorization decision based on the results of a LookupSubjects request with version before v1.30.1 is affected. Version 1.30.1 contains a patch for the issue. • https://github.com/authzed/spicedb/commit/a244ed1edfaf2382711dccdb699971ec97190c7b https://github.com/authzed/spicedb/releases/tag/v1.30.1 https://github.com/authzed/spicedb/security/advisories/GHSA-j85q-46hg-36p2 • CWE-755: Improper Handling of Exceptional Conditions •
CVE-2024-27101 – Integer overflow in chunking helper causes dispatching to miss elements or panic
https://notcve.org/view.php?id=CVE-2024-27101
SpiceDB is an open source, Google Zanzibar-inspired database for creating and managing security-critical application permissions. Integer overflow in chunking helper causes dispatching to miss elements or panic. Any SpiceDB cluster with any schema where a resource being checked has more than 65535 relationships for the same resource and subject type is affected by this problem. The CheckPermission, BulkCheckPermission, and LookupSubjects API methods are affected. This vulnerability is fixed in 1.29.2. • https://github.com/authzed/spicedb/commit/ef443c442b96909694390324a99849b0407007fe https://github.com/authzed/spicedb/security/advisories/GHSA-h3m7-rqc4-7h9p • CWE-190: Integer Overflow or Wraparound •
CVE-2023-46255 – `SPICEDB_DATASTORE_CONN_URI` is leaked when URI cannot be parsed
https://notcve.org/view.php?id=CVE-2023-46255
SpiceDB is an open source, Google Zanzibar-inspired database for creating and managing security-critical application permissions. Prior to version 1.27.0-rc1, when the provided datastore URI is malformed (e.g. by having a password which contains `:`) the full URI (including the provided password) is printed, so that the password is shown in the logs. Version 1.27.0-rc1 patches this issue. SpiceDB es una base de datos de código abierto inspirada en Google Zanzíbar para crear y administrar permisos de aplicaciones críticas para la seguridad. Antes de la versión 1.27.0-rc1, cuando el URI del almacén de datos proporcionado tiene un formato incorrecto (por ejemplo, al tener una contraseña que contiene `:`), se imprime el URI completo (incluida la contraseña proporcionada), de modo que la contraseña se muestra en los registros. • https://github.com/authzed/spicedb/commit/ae50421b80f895e4c98d999b18e06b6f1e6f1cf8 https://github.com/authzed/spicedb/security/advisories/GHSA-jg7w-cxjv-98c2 • CWE-532: Insertion of Sensitive Information into Log File •