@backstage/plugin-scaffolder-backend@0.0.0-nightly-20230923020926 vulnerabilities

The Backstage backend plugin that helps you create new things

Direct Vulnerabilities

Known vulnerabilities in the @backstage/plugin-scaffolder-backend package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Insertion of Sensitive Information into Log File

@backstage/plugin-scaffolder-backend is a The Backstage backend plugin that helps you create new things

Affected versions of this package are vulnerable to Insertion of Sensitive Information into Log File via the fetch:template action, which duplicates logging of the input values. An attacker can access sensitive information by reviewing logs where secrets may not have been properly redacted.

Note: This is only exploitable if ${{ secrets.x }} are passed as arguments to fetch:template.

How to fix Insertion of Sensitive Information into Log File?

Upgrade @backstage/plugin-scaffolder-backend to version 2.1.1 or higher.

<2.1.1
  • H
Arbitrary Code Injection

@backstage/plugin-scaffolder-backend is a The Backstage backend plugin that helps you create new things

Affected versions of this package are vulnerable to Arbitrary Code Injection due to the usage of insecure sandbox plugin. Exploiting this vulnerability is possible by an attacker with write access to a registered scaffolder template, and it allows manipulation of the template in a way that allows remote code execution.

Note: This was only exploitable in the template YAML definition itself and not by user input data.

How to fix Arbitrary Code Injection?

Upgrade @backstage/plugin-scaffolder-backend to version 1.15.0 or higher.

<1.15.0