Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-29185

Опубликовано: 07 мар. 2026
Источник: redhat
CVSS3: 2.7

Описание

Backstage is an open framework for building developer portals. Prior to version 1.20.1, a vulnerability in the SCM URL parsing used by Backstage integrations allowed path traversal sequences in encoded form to be included in file paths. When these URLs were processed by integration functions that construct API URLs, the traversal segments could redirect requests to unintended SCM provider API endpoints using the configured server-side integration credentials. This issue has been patched in version 1.20.1.

A flaw was found in the Backstage SCM (Source Code Management) integration component. This vulnerability allows an attacker to include encoded path traversal sequences within SCM URLs. When these URLs are processed, the traversal segments can redirect requests to unintended SCM provider API endpoints. This could lead to unauthorized access or information disclosure using the configured server-side integration credentials.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Developer Hubrhdh/rhdh-hub-rhel9Fix deferred
Self-service automation portal 2ansible-automation-platform/automation-portalFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=2445484@backstage/integration: Backstage SCM Integration: Unauthorized access to SCM APIs via path traversal

2.7 Low

CVSS3

Связанные уязвимости

CVSS3: 2.7
nvd
20 дней назад

Backstage is an open framework for building developer portals. Prior to version 1.20.1, a vulnerability in the SCM URL parsing used by Backstage integrations allowed path traversal sequences in encoded form to be included in file paths. When these URLs were processed by integration functions that construct API URLs, the traversal segments could redirect requests to unintended SCM provider API endpoints using the configured server-side integration credentials. This issue has been patched in version 1.20.1.

CVSS3: 2.7
github
23 дня назад

Backstage vulnerable to potential reading of SCM URLs using built in token

2.7 Low

CVSS3