Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-36085 : What You Need to Know

Discover the impact of CVE-2022-36085 on Open Policy Agent (OPA) with a HIGH severity rating. Learn how to mitigate the risks and prevent exploitation effectively.

Open Policy Agent (OPA) has been found to have a vulnerability that allows bypassing the

WithUnsafeBuiltins
function using the
with
keyword to mock functions. This article provides insights into CVE-2022-36085 and how to address it.

Understanding CVE-2022-36085

This section delves into what CVE-2022-36085 entails in terms of impact, affected systems, and how to mitigate the associated risks.

What is CVE-2022-36085?

The vulnerability in OPA allows an attacker to bypass security protections by using the

with
keyword to mock unsafe built-in functions, which are otherwise rejected by the compiler. The issue affects OPA versions >= 0.40.0 and < 0.43.1.

The Impact of CVE-2022-36085

With a CVSS base score of 7.4, the severity of this vulnerability is rated as HIGH. It poses risks to confidentiality, integrity, and highlights a protection mechanism failure.

Technical Details of CVE-2022-36085

Providing more technical insights into the vulnerability and how it operates within the OPA environment.

Vulnerability Description

The flaw lies in the

WithUnsafeBuiltins
function, where the
with
keyword is not considered, enabling malicious actors to bypass security controls by mimicking dangerous built-in functions.

Affected Systems and Versions

OPA versions >= 0.40.0 and < 0.43.1 are impacted by this vulnerability. Users of these versions are at risk of exploitation if not promptly addressed.

Exploitation Mechanism

To exploit the vulnerability, an attacker needs to craft policies that satisfy specific conditions, allowing them to misuse the

with
keyword to circumvent security checks.

Mitigation and Prevention

Recommendations and best practices to mitigate the risks posed by CVE-2022-36085.

Immediate Steps to Take

As an immediate measure, users should refrain from using the

WithUnsafeBuiltins
function. Instead, leverage the
capabilities
feature as a safer alternative.

Long-Term Security Practices

Implementing secure coding practices, regular security assessments, and staying informed about updates and patches are crucial for long-term security resilience.

Patching and Updates

Users are strongly advised to update their OPA installations to version 0.43.1, which includes a patch to address this vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now