CVE-2024-45816

Backstage is an open framework for building developer portals. When using the AWS S3 or GCS storage provider for TechDocs it is possible to access content in the entire storage bucket. This can leak contents of the bucket that are not intended to be accessible, as well as bypass permission checks in Backstage. This has been fixed in the 1.10.13 release of the `@backstage/plugin-techdocs-backend` package. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:backstage:backstage:*:*:*:*:*:*:*:*

History

23 Sep 2024, 18:41

Type Values Removed Values Added
References () https://github.com/backstage/backstage/security/advisories/GHSA-39v3-f278-vj3g - () https://github.com/backstage/backstage/security/advisories/GHSA-39v3-f278-vj3g - Third Party Advisory
CPE cpe:2.3:a:backstage:backstage:*:*:*:*:*:*:*:*
First Time Backstage
Backstage backstage
CWE CWE-22

20 Sep 2024, 12:30

Type Values Removed Values Added
Summary
  • (es) Backstage es un framework abierto para crear portales para desarrolladores. Al utilizar el proveedor de almacenamiento AWS S3 o GCS para TechDocs, es posible acceder al contenido de todo el depósito de almacenamiento. Esto puede filtrar contenido del depósito al que no se pretende acceder, así como eludir las comprobaciones de permisos en Backstage. Esto se ha solucionado en la versión 1.10.13 del paquete `@backstage/plugin-techdocs-backend`. Se recomienda a todos los usuarios que actualicen. No existen workarounds para esta vulnerabilidad.

17 Sep 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-17 21:15

Updated : 2024-09-23 18:41


NVD link : CVE-2024-45816

Mitre link : CVE-2024-45816

CVE.ORG link : CVE-2024-45816


JSON object : View

Products Affected

backstage

  • backstage
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-23

Relative Path Traversal