First published: Tue Sep 17 2024(Updated: )
### Impact A malicious actor with authenticated access to a Backstage instance with the catalog backend plugin installed is able to interrupt the service using a specially crafted query to the catalog API. ### Patches This has been fixed in the `1.26.0` release of the `@backstage/plugin-catalog-backend` package. ### References If you have any questions or comments about this advisory: Open an issue in the [Backstage repository](https://github.com/backstage/backstage) Visit our Discord, linked to in [Backstage README](https://github.com/backstage/backstage)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/@backstage/plugin-catalog-backend | <1.26.0 | 1.26.0 |
Backstage | <1.26.0 | |
Backstage | <1.26.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45815 has a high severity, as it allows authenticated users to interrupt the service.
To fix CVE-2024-45815, upgrade to version 1.26.0 or later of the Backstage catalog backend plugin.
CVE-2024-45815 affects Backstage installations with the catalog backend plugin before version 1.26.0.
Any malicious actor with authenticated access to a Backstage instance can exploit CVE-2024-45815.
The impact of CVE-2024-45815 is that it can disrupt service by executing a specially crafted query to the catalog API.