0.27.1
5 years ago
2 days ago
Known vulnerabilities in the @backstage/plugin-auth-backend package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
@backstage/plugin-auth-backend is an A Backstage backend plugin that handles authentication Affected versions of this package are vulnerable to Open Redirect via the OAuth redirect URI validation bypass. An attacker can intercept authorization codes by crafting a redirect URI that bypasses the allowlist and leads to an attacker-controlled host, provided a victim approves the OAuth consent request. This is only exploitable if experimental Dynamic Client Registration or Client ID Metadata Documents features are explicitly enabled. Note: This issue affects experimental Dynamic Client Registration and Client ID Metadata Documents features with configured How to fix Open Redirect? Upgrade | <0.27.1 |
@backstage/plugin-auth-backend is an A Backstage backend plugin that handles authentication Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) in the CIMD metadata fetch when the Note: The practical impact is limited. The attacker cannot read the response body from the internal request, cannot control request headers or method, and the feature must be explicitly enabled via an experimental flag that is off by default. How to fix Server-side Request Forgery (SSRF)? Upgrade | >=0.27.0 <0.27.1 |