// For flags

CVE-2021-32660

TechDocs content sanitization bypass

Severity Score

8.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Backstage is an open platform for building developer portals, and techdocs-common contains common functionalities for Backstage's TechDocs. In versions of `@backstage/tehdocs-common` prior to 0.6.4, a malicious internal actor is able to upload documentation content with malicious scripts. These scripts would normally be sanitized by the TechDocs frontend, but by tricking a user to visit the content via the TechDocs API, the content sanitazion will be bypassed. If the TechDocs API is hosted on the same origin as the Backstage app or other backend plugins, this may give access to sensitive data. The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store. The vulnerability is patched in the `0.6.4` release of `@backstage/techdocs-common`.

Backstage es una plataforma abierta para construir portales para desarrolladores, y techdocs-common contiene funcionalidades comunes para los TechDocs de Backstage. En las versiones de "@backstage/tehdocs-common" anteriores a versión 0.6.4, un actor interno malicioso es capaz de subir contenido de documentación con scripts maliciosos. Estos scripts serían normalmente saneados por el frontend de TechDocs, pero al engañar a un usuario a visitar el contenido por medio de la API de TechDocs, el saneamiento del contenido será omitido. Si la API de TechDocs está alojada en el mismo origen que la aplicación Backstage u otros plugins del backend, esto puede dar acceso a datos confidenciales. La capacidad de subir contenido malicioso puede estar limitada por los procesos internos de revisión de código, a menos que el método de despliegue de TechDocs elegido sea usar un almacén de objetos y el actor tenga acceso a subir archivos directamente a ese almacén. La vulnerabilidad está parcheada en la versión "0.6.4" de "@backstage/techdocs-common"

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-05-12 CVE Reserved
  • 2021-06-03 CVE Published
  • 2024-02-17 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
  • CWE-434: Unrestricted Upload of File with Dangerous Type
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linuxfoundation
Search vendor "Linuxfoundation"
\@backstage\/techdocs-common
Search vendor "Linuxfoundation" for product "\@backstage\/techdocs-common"
< 0.6.4
Search vendor "Linuxfoundation" for product "\@backstage\/techdocs-common" and version " < 0.6.4"
node.js
Affected