@backstage/plugin-scaffolder-backend/.../plugin-scaffolder-backend@0.15.6 vulnerabilities

The Backstage backend plugin that helps you create new things

  • latest version

    1.26.3

  • latest non vulnerable version

  • first published

    4 years ago

  • latest version published

    16 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the @backstage/plugin-scaffolder-backend package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Arbitrary Code Injection

    @backstage/plugin-scaffolder-backend is a The Backstage backend plugin that helps you create new things

    Affected versions of this package are vulnerable to Arbitrary Code Injection due to the usage of insecure sandbox plugin. Exploiting this vulnerability is possible by an attacker with write access to a registered scaffolder template, and it allows manipulation of the template in a way that allows remote code execution.

    Note: This was only exploitable in the template YAML definition itself and not by user input data.

    How to fix Arbitrary Code Injection?

    Upgrade @backstage/plugin-scaffolder-backend to version 1.15.0 or higher.

    <1.15.0
    • H
    Remote Code Execution (RCE)

    @backstage/plugin-scaffolder-backend is a The Backstage backend plugin that helps you create new things

    Affected versions of this package are vulnerable to Remote Code Execution (RCE). The templating library used in this package assumes that templates based on nunjucks are trusted, which is considered as an undesired property.

    ###Note: This is only exploitable in the template yaml definition itself and not by user input data.

    How to fix Remote Code Execution (RCE)?

    Upgrade @backstage/plugin-scaffolder-backend to version 0.15.14 or higher.

    >=0.1.1-alpha.9 <0.15.14
    • H
    Directory Traversal

    @backstage/plugin-scaffolder-backend is a The Backstage backend plugin that helps you create new things

    Affected versions of this package are vulnerable to Directory Traversal. When a malicious actor has write access to a registered scaffolder template, it is possible to manipulate the template in a way that writes files to arbitrary paths on the host. It is also possible to exploit this through user input when executing a template, without any write permissions. This method will not allow the attacker to control the contents of the injected file however, unless the template is also crafted in a specific way that gives control of the file contents.

    How to fix Directory Traversal?

    Upgrade @backstage/plugin-scaffolder-backend to version 0.15.14 or higher.

    >=0.1.1-alpha.9 <0.15.14
    • M
    Directory Traversal

    @backstage/plugin-scaffolder-backend is a The Backstage backend plugin that helps you create new things

    Affected versions of this package are vulnerable to Directory Traversal. The attack is executed by creating a custom Scaffolder template with a publish:github:pull-request action using a particular source path which can lead to sensitive files get readable.

    How to fix Directory Traversal?

    Upgrade @backstage/plugin-scaffolder-backend to version 0.15.9 or higher.

    >=0.9.4 <0.15.9