Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pgf8-28gg-vpr6

Опубликовано: 04 июн. 2021
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

Path traversal

Impact

A malicious actor could read sensitive files from the environment where TechDocs documentation is built and published by setting a particular path for docs_dir in mkdocs.yml. These files would then be available over the TechDocs backend API.

This vulnerability is mitigated by the fact that an attacker would need access to modify the mkdocs.yml in the documentation source code, and would also need access to the TechDocs backend API.

Patches

The vulnerability is patched in the 0.6.3 release of @backstage/techdocs-common.

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

@backstage/techdocs-common

npm
Затронутые версииВерсия исправления

< 0.6.3

0.6.3

EPSS

Процентиль: 65%
0.00484
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 6.5
nvd
больше 4 лет назад

Backstage is an open platform for building developer portals, and techdocs-common contains common functionalities for Backstage's TechDocs. In `@backstage/techdocs-common` versions prior to 0.6.3, a malicious actor could read sensitive files from the environment where TechDocs documentation is built and published by setting a particular path for `docs_dir` in `mkdocs.yml`. These files would then be available over the TechDocs backend API. This vulnerability is mitigated by the fact that an attacker would need access to modify the `mkdocs.yml` in the documentation source code, and would also need access to the TechDocs backend API. The vulnerability is patched in the `0.6.3` release of `@backstage/techdocs-common`.

EPSS

Процентиль: 65%
0.00484
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-22