Backstage is an open framework for building developer portals. When using the AWS S3 or GCS storage provider for TechDocs it is possible to access content in the entire storage bucket. This can leak contents of the bucket that are not intended to be accessible, as well as bypass permission checks in Backstage. This has been fixed in the 1.10.13 release of the `@backstage/plugin-techdocs-backend` package. All users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Mon, 23 Sep 2024 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Backstage
Backstage backstage
Weaknesses CWE-22
CPEs cpe:2.3:a:backstage:backstage:*:*:*:*:*:*:*:*
Vendors & Products Backstage
Backstage backstage

Wed, 18 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Sep 2024 01:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 17 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
Description Backstage is an open framework for building developer portals. When using the AWS S3 or GCS storage provider for TechDocs it is possible to access content in the entire storage bucket. This can leak contents of the bucket that are not intended to be accessible, as well as bypass permission checks in Backstage. This has been fixed in the 1.10.13 release of the `@backstage/plugin-techdocs-backend` package. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Title Storage bucket Directory Traversal in @backstage/plugin-techdocs-backend
Weaknesses CWE-23
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-09-17T20:13:29.331Z

Updated: 2024-09-18T14:50:20.582Z

Reserved: 2024-09-09T14:23:07.506Z

Link: CVE-2024-45816

cve-icon Vulnrichment

Updated: 2024-09-18T14:50:16.575Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-17T21:15:12.553

Modified: 2024-09-23T18:41:15.603

Link: CVE-2024-45816

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-09-17T21:15:12Z

Links: CVE-2024-45816 - Bugzilla