Products
@backstage/plugin-catalog-backend
- 1.26.0
Source
security-advisories@github.com
Tags
CVE-2024-45815 details
Published : Sept. 17, 2024, 9:15 p.m.
Last Modified : Sept. 17, 2024, 9:15 p.m.
Last Modified : Sept. 17, 2024, 9:15 p.m.
Description
Backstage is an open framework for building developer portals. A malicious actor with authenticated access to a Backstage instance with the catalog backend plugin installed is able to interrupt the service using a specially crafted query to the catalog API. This has been fixed in the `1.26.0` release of the `@backstage/plugin-catalog-backend`. All users are advised to upgrade. There are no known workarounds for this vulnerability.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6.5 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-1321 | Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
Base Score
6.5
Exploitability Score
2.8
Impact Score
3.6
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
References
URL | Source |
---|---|
https://github.com/backstage/backstage/security/advisories/GHSA-3x3f-jcp3-g22j | security-advisories@github.com |
This website uses the NVD API, but is not approved or certified by it.