Backstage is an open platform for building developer portals. The Backstage scaffolder-backend plugin uses a templating library that requires sandbox, as it by design allows for code injection. The library used for this sandbox so far has been `vm2`, but in light of several past vulnerabilities and existing vulnerabilities that may not have a fix, the plugin has switched to using a different sandbox library. A malicious actor with write access to a registered scaffolder template could manipulate the template in a way that allows for remote code execution on the scaffolder-backend instance. This was only exploitable in the template YAML definition itself and not by user input data. This is vulnerability is fixed in version 1.15.0 of `@backstage/plugin-scaffolder-backend`.
History

Thu, 05 Dec 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2023-06-22T13:29:03.361Z

Updated: 2024-12-05T17:48:07.987Z

Reserved: 2023-06-20T14:02:45.592Z

Link: CVE-2023-35926

cve-icon Vulnrichment

Updated: 2024-08-02T16:37:40.040Z

cve-icon NVD

Status : Modified

Published: 2023-06-22T14:15:09.607

Modified: 2024-11-21T08:08:59.457

Link: CVE-2023-35926

cve-icon Redhat

No data.