CVE-2024-45815

Sept. 17, 2024, 9:15 p.m.

Received
CVE has been recently published to the CVE List and has been received by the NVD.

Products

@backstage/plugin-catalog-backend

  • 1.26.0

Source

security-advisories@github.com

Tags

CVE-2024-45815 details

Published : Sept. 17, 2024, 9:15 p.m.
Last Modified : Sept. 17, 2024, 9:15 p.m.

Description

Backstage is an open framework for building developer portals. A malicious actor with authenticated access to a Backstage instance with the catalog backend plugin installed is able to interrupt the service using a specially crafted query to the catalog API. This has been fixed in the `1.26.0` release of the `@backstage/plugin-catalog-backend`. All users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS Score

1 2 3 4 5 6.5 7 8 9 10

Weakness

Weakness Name Description
CWE-1321 Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.

CVSS Data

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

Base Score

6.5

Exploitability Score

2.8

Impact Score

3.6

Base Severity

MEDIUM

References

URL Source
https://github.com/backstage/backstage/security/advisories/GHSA-3x3f-jcp3-g22j security-advisories@github.com
This website uses the NVD API, but is not approved or certified by it.