// For flags

CVE-2021-32662

TechDocs mkdocs.yml path traversal

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Backstage is an open platform for building developer portals, and techdocs-common contains common functionalities for Backstage's TechDocs. In `@backstage/techdocs-common` versions prior to 0.6.3, a malicious actor could read sensitive files from the environment where TechDocs documentation is built and published by setting a particular path for `docs_dir` in `mkdocs.yml`. These files would then be available over the TechDocs backend API. This vulnerability is mitigated by the fact that an attacker would need access to modify the `mkdocs.yml` in the documentation source code, and would also need access to the TechDocs backend API. The vulnerability is patched in the `0.6.3` release of `@backstage/techdocs-common`.

Backstage es una plataforma abierta para construir portales para desarrolladores, y la función techdocs-common contiene funcionalidades comunes para los TechDocs de Backstage. En "@backstage/techdocs-common" versiones anteriores a 0.6.3, un actor malicioso podía leer archivos confidenciales del entorno donde se construye y publica la documentación de TechDocs ajustando una ruta particular para la función "docs_dir" en el archivo "mkdocs.yml". Estos archivos estarían entonces disponibles a través de la API del backend de TechDocs. Esta vulnerabilidad está mitigada por el hecho de que un atacante necesitaría acceso para modificar el archivo "mkdocs.yml" en el código fuente de la documentación, y también necesitaría acceso a la API del backend de TechDocs. La vulnerabilidad está parcheada en la versión "0.6.3" de "@backstage/techdocs-common"

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-05-12 CVE Reserved
  • 2021-06-03 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linuxfoundation
Search vendor "Linuxfoundation"
Backstage
Search vendor "Linuxfoundation" for product "Backstage"
< 0.6.3
Search vendor "Linuxfoundation" for product "Backstage" and version " < 0.6.3"
-
Affected