CVE-2021-32661
TechDocs object element script injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Backstage is an open platform for building developer portals. In versions of Backstage's Techdocs Plugin (`@backstage/plugin-techdocs`) prior to 0.9.5, a malicious internal actor can potentially upload documentation content with malicious scripts by embedding the script within an `object` element. This may give access to sensitive data when other users visit that same documentation page. The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store. The vulnerability is patched in the `0.9.5` release of `@backstage/plugin-techdocs`.
Backstage es una plataforma abierta para construir portales para desarrolladores. En las versiones del plugin Techdocs de Backstage ("@backstage/plugin-techdocs") anteriores a versión 0.9.5, un actor interno malicioso puede potencialmente cargar contenido de documentación con scripts maliciosos insertando el script dentro de un elemento "object". Esto puede dar acceso a datos confidenciales cuando otros usuarios visiten esa misma página de documentación. La capacidad de subir contenido malicioso puede estar limitada por los procesos internos de revisión de código, a menos que el método de despliegue de TechDocs elegido sea usar un almacén de objetos y el actor tenga acceso a subir archivos directamente a ese almacén. La vulnerabilidad está parcheada en la versión "0.9.5" de "@backstage/plugin-techdocs"
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-05-12 CVE Reserved
- 2021-06-03 CVE Published
- 2024-02-17 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
- CWE-434: Unrestricted Upload of File with Dangerous Type
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://github.com/backstage/backstage/releases/tag/release-2021-06-03 | Third Party Advisory | |
https://github.com/backstage/backstage/security/advisories/GHSA-gg96-f8wr-p89f | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c | 2021-06-21 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linuxfoundation Search vendor "Linuxfoundation" | \@backstage\/plugin-techdocs Search vendor "Linuxfoundation" for product "\@backstage\/plugin-techdocs" | < 0.9.5 Search vendor "Linuxfoundation" for product "\@backstage\/plugin-techdocs" and version " < 0.9.5" | node.js |
Affected
|