7.3
CWE
209
EPSS
0.049%
Advisory Published
CVE Published
Advisory Published
Updated

CVE-2023-6944: Rhdh: catalog-import function leaks credentials to frontend

First published: Tue Dec 19 2023(Updated: )

A flaw was found in Red Hat Developer Hub (RHDH) in the catalog-import function. The vulnerability is that the catalog-import function leaks GitLab access tokens on the frontend. This leakage occurs when the base64 encoded GitLab token includes a newline at the end of the string. The sanitized error displayed on the frontend inadvertently includes the raw access token, which should never be exposed to frontend users. The impact of this vulnerability is significant. An attacker, upon gaining access to this token, could potentially execute a range of malicious activities depending on the token's permissions. These activities could include pushing malicious code to repositories, deleting resources in Git, revoking or generating new keys, or even signing code illegitimately.

Credit: secalert@redhat.com secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
npm/@backstage/backend-app-api<0.5.9-next.1
0.5.9-next.1
redhat/rhdh<1.21.0
1.21.0
Redhat Red Hat Developer Hub<1.21.0
Backstage<1.21.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2023-6944?

    CVE-2023-6944 has a moderate severity due to the potential exposure of sensitive GitLab access tokens.

  • How do I fix CVE-2023-6944?

    To remediate CVE-2023-6944, update Red Hat Developer Hub to version 1.21.0 or later.

  • What systems are affected by CVE-2023-6944?

    CVE-2023-6944 affects Red Hat Developer Hub versions prior to 1.21.0 and certain versions of Linux Foundation's Backstage.

  • What kind of data is leaked by CVE-2023-6944?

    CVE-2023-6944 leaks GitLab access tokens on the frontend, potentially exposing user credentials.

  • Is there a workaround for CVE-2023-6944?

    Currently, the recommended fix for CVE-2023-6944 is to upgrade to the patched versions as no specific workaround has been provided.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203