Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-4jqc-jvh2-pxg9: Path traversal for local publishers in TechDocs backend

Impact

A malicious actor with the ability to register entities in the Software Catalog is able to write files to arbitrary paths on the techdocs backend host instance when techdocs.publisher.type is set to local.

This vulnerability is mitigated by the fact that the Software Catalog must be configured with non-standard field format validators and/or non-standard entity policies.

Patches

Those affected are advised to upgrade to @backstage/plugin-techdocs-node version 1.1.2 or higher.

Workarounds

If patching or upgrading is not possible, it would be sufficient to update any custom Catalog field format validators and/or custom entity policies to disallow entity names, kinds, and namespaces containing ..

<!–

References

todo: Link to blog post / published report. –>

For more information

If you have any questions or comments about this advisory:

ghsa
#vulnerability#git

Impact

A malicious actor with the ability to register entities in the Software Catalog is able to write files to arbitrary paths on the techdocs backend host instance when techdocs.publisher.type is set to local.

This vulnerability is mitigated by the fact that the Software Catalog must be configured with non-standard field format validators and/or non-standard entity policies.

Patches

Those affected are advised to upgrade to @backstage/plugin-techdocs-node version 1.1.2 or higher.

Workarounds

If patching or upgrading is not possible, it would be sufficient to update any custom Catalog field format validators and/or custom entity policies to disallow entity names, kinds, and namespaces containing …

For more information

If you have any questions or comments about this advisory:

  • Open an issue in the Backstage repository
  • Visit our chat, linked to in the Backstage README

References

  • GHSA-4jqc-jvh2-pxg9
  • backstage/backstage@429c9f9

ghsa: Latest News

GHSA-27wf-5967-98gx: Kubernetes kubelet arbitrary command execution