First published: Thu Jun 03 2021(Updated: )
Backstage is an open platform for building developer portals, and techdocs-common contains common functionalities for Backstage's TechDocs. In `@backstage/techdocs-common` versions prior to 0.6.3, a malicious actor could read sensitive files from the environment where TechDocs documentation is built and published by setting a particular path for `docs_dir` in `mkdocs.yml`. These files would then be available over the TechDocs backend API. This vulnerability is mitigated by the fact that an attacker would need access to modify the `mkdocs.yml` in the documentation source code, and would also need access to the TechDocs backend API. The vulnerability is patched in the `0.6.3` release of `@backstage/techdocs-common`.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Backstage | <0.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-32662.
Backstage is an open platform for building developer portals.
techdocs-common contains common functionalities for Backstage's TechDocs.
The severity of CVE-2021-32662 is medium.
A malicious actor could read sensitive files from the environment where TechDocs documentation is built.
Upgrade to version 0.6.3 or later of @backstage/techdocs-common.
You can find more information about CVE-2021-32662 in the following references: [Link 1](https://github.com/backstage/backstage/commit/8cefadca04cbf01d0394b0cb1983247e5f1d6208), [Link 2](https://github.com/backstage/backstage/releases/tag/release-2021-05-27), [Link 3](https://github.com/backstage/backstage/security/advisories/GHSA-pgf8-28gg-vpr6).
The Common Weakness Enumeration (CWE) ID for this vulnerability is CWE-22.