GHSA-pvv8-8fx9-h673

Suggest an improvement
Source
https://github.com/advisories/GHSA-pvv8-8fx9-h673
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/10/GHSA-pvv8-8fx9-h673/GHSA-pvv8-8fx9-h673.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-pvv8-8fx9-h673
Aliases
Related
Published
2021-10-19T15:28:03Z
Modified
2023-11-08T04:06:52.973141Z
Severity
  • 6.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N CVSS Calculator
Summary
Path Traversal in @backstage/plugin-scaffolder-backend
Details

Impact

A malicious actor could read sensitive files from the environment where Scaffolder tasks are run. The attack is executed by crafting a custom Scaffolder template with a publish:github:pull-request action using a particular source path. When the template is executed the sensitive files would be included in the published pull request.

This vulnerability is mitigated by the fact that an attacker would need access to create and register templates in the Backstage catalog, and that the attack is very visible given that the exfiltration happens via a pull request.

Patches

The vulnerability is patched in the 0.15.9 release of @backstage/plugin-scaffolder-backend.

For more information

If you have any questions or comments about this advisory:

Database specific
{
    "nvd_published_at": "2021-10-18T21:15:00Z",
    "github_reviewed_at": "2021-10-18T20:47:02Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-22"
    ]
}
References

Affected packages

npm / @backstage/plugin-scaffolder-backend

Package

Name
@backstage/plugin-scaffolder-backend
View open source insights on deps.dev
Purl
pkg:npm/%40backstage/plugin-scaffolder-backend

Affected ranges

Type
SEMVER
Events
Introduced
0.9.4
Fixed
0.15.9