Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-95v5-prp4-5gv5

Опубликовано: 05 мар. 2026
Источник: github
Github: Прошло ревью
CVSS3: 2.7

Описание

Backstage vulnerable to potential reading of SCM URLs using built in token

Impact

A vulnerability in the SCM URL parsing used by Backstage integrations allowed path traversal sequences in encoded form to be included in file paths. When these URLs were processed by integration functions that construct API URLs, the traversal segments could redirect requests to unintended SCM provider API endpoints using the configured server-side integration credentials.

This affects instances that use any of the SCM integrations (GitHub, Bitbucket Server, Bitbucket Cloud) with the scaffolder or other features that accept user-provided SCM URLs.

Patches

This is patched in @backstage/integration version 1.20.1.

Workarounds

There is no workaround for this vulnerability. Users should upgrade to the patched version.

References

Пакеты

Наименование

@backstage/integration

npm
Затронутые версииВерсия исправления

<= 1.20.0

1.20.1

EPSS

Процентиль: 2%
0.00013
Низкий

2.7 Low

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 2.7
redhat
20 дней назад

Backstage is an open framework for building developer portals. Prior to version 1.20.1, a vulnerability in the SCM URL parsing used by Backstage integrations allowed path traversal sequences in encoded form to be included in file paths. When these URLs were processed by integration functions that construct API URLs, the traversal segments could redirect requests to unintended SCM provider API endpoints using the configured server-side integration credentials. This issue has been patched in version 1.20.1.

CVSS3: 2.7
nvd
20 дней назад

Backstage is an open framework for building developer portals. Prior to version 1.20.1, a vulnerability in the SCM URL parsing used by Backstage integrations allowed path traversal sequences in encoded form to be included in file paths. When these URLs were processed by integration functions that construct API URLs, the traversal segments could redirect requests to unintended SCM provider API endpoints using the configured server-side integration credentials. This issue has been patched in version 1.20.1.

EPSS

Процентиль: 2%
0.00013
Низкий

2.7 Low

CVSS3

Дефекты

CWE-22