Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1899 | Backstage is an open platform for building developer portals. The Backstage scaffolder-backend plugin uses a templating library that requires sandbox, as it by design allows for code injection. The library used for this sandbox so far has been `vm2`, but in light of several past vulnerabilities and existing vulnerabilities that may not have a fix, the plugin has switched to using a different sandbox library. A malicious actor with write access to a registered scaffolder template could manipulate the template in a way that allows for remote code execution on the scaffolder-backend instance. This was only exploitable in the template YAML definition itself and not by user input data. This is vulnerability is fixed in version 1.15.0 of `@backstage/plugin-scaffolder-backend`. |
Github GHSA |
GHSA-wg6p-jmpc-xjmr | Backstage Scaffolder plugin has insecure sandbox |
Thu, 05 Dec 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-12-05T17:48:07.987Z
Reserved: 2023-06-20T14:02:45.592Z
Link: CVE-2023-35926
Updated: 2024-08-02T16:37:40.040Z
Status : Modified
Published: 2023-06-22T14:15:09.607
Modified: 2024-11-21T08:08:59.457
Link: CVE-2023-35926
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA