Skip to content

Privilege escalation when unauthorized role is set

Critical
shahidhk published GHSA-j622-hw7j-c72x May 11, 2020

Package

No package listed

Affected versions

v1.2.0-beta.5 and v1.2.0

Patched versions

v1.2.1

Description

Impact

Affected server versions are v1.2.0-beta.5, v1.2.0 and only when HASURA_GRAPHQL_UNAUTHORIZED_ROLE is set. Unauthenticated users can run API calls as any role by setting a x-hasura-role header.

To know if you were affected, please check your logs for API calls with x-hasura-role values for queries you did not expect. If you've followed guidelines from the Hasura production checklist, the impact would have been significantly reduced. If you need help in assessing the impact, please reach out to us via the the contact information below.

Patches

A patch has been released as v1.2.1. Please upgrade to this version immediately.

For more information

If you have any questions or comments about this advisory, please email us at [email protected].

Please follow our security mailing list to stay updated with advisories. More information about security vulnerability reporting and disclosure can be found in our docs.

Severity

Critical

CVE ID

No known CVE

Weaknesses

No CWEs