CVE-2023-35926 – @backstage/plugin-scaffolder-backend
Package
Manager: npm
Name: @backstage/plugin-scaffolder-backend
Vulnerable Version: >=0 <1.15.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.02213 pctl0.8384
Details
Backstage Scaffolder plugin has insecure sandbox The Backstage scaffolder-backend plugin uses a templating library that requires a sandbox, as it by design allows for code injection. The library used for this sandbox so far has been `vm2`, but in light of several past vulnerabilities and existing vulnerabilities that may not have a fix, the plugin has switched to using a different sandbox library. ### Impact A malicious actor with write access to a registered scaffolder template could manipulate the template in a way that allows for remote code execution on the scaffolder-backend instance. This was only exploitable in the template YAML definition itself and not by user input data. ### Patches This is vulnerability is fixed in version 1.15.0 of `@backstage/plugin-scaffolder-backend`. ### Workarounds Note that the [Backstage Threat Model](https://backstage.io/docs/overview/threat-model) states that scaffolder templates are considered to be a sensitive area that with the recommendation that you control access and perform manual reviews of changes to the scaffolder templates. The exploit is of a nature where it is easily discoverable in manual review.
Metadata
Created: 2023-06-21T22:00:30Z
Modified: 2023-06-21T22:00:30Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/06/GHSA-wg6p-jmpc-xjmr/GHSA-wg6p-jmpc-xjmr.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-wg6p-jmpc-xjmr
Finding: F422
Auto approve: 1