Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8qp7-fhr9-fw53

Опубликовано: 05 мар. 2026
Источник: github
Github: Прошло ревью
CVSS3: 2

Описание

@backstage/plugin-scaffolder-backend Vulnerable to Potential Session Token Exfiltration via Log Redaction Bypass

Impact

A malicious scaffolder template can bypass the log redaction mechanism to exfiltrate secrets provided run through task event logs.

The attack requires:

  • The ability to register a template in the catalog
  • A victim who executes the malicious template

Patches

Patched in @backstage/plugin-scaffolder-backend version 3.1.4

Workarounds

  • Implement a custom permission policy that restricts scaffolder.task.read so users can only read their own task logs
  • Restrict who can register templates in the catalog to trusted users only

Resources

Пакеты

Наименование

@backstage/plugin-scaffolder-backend

npm
Затронутые версииВерсия исправления

<= 3.1.3

3.1.4

EPSS

Процентиль: 1%
0.00009
Низкий

2 Low

CVSS3

Дефекты

CWE-532

Связанные уязвимости

CVSS3: 2
redhat
20 дней назад

Backstage is an open framework for building developer portals. Prior to version 3.1.4, a malicious scaffolder template can bypass the log redaction mechanism to exfiltrate secrets provided run through task event logs. This issue has been patched in version 3.1.4.

CVSS3: 2
nvd
20 дней назад

Backstage is an open framework for building developer portals. Prior to version 3.1.4, a malicious scaffolder template can bypass the log redaction mechanism to exfiltrate secrets provided run through task event logs. This issue has been patched in version 3.1.4.

EPSS

Процентиль: 1%
0.00009
Низкий

2 Low

CVSS3

Дефекты

CWE-532