Platform
nodejs
Component
@backstage/plugin-techdocs-backend
Fixed in
1.10.14
1.10.13
CVE-2024-45816 is a Directory Traversal vulnerability affecting the @backstage/plugin-techdocs-backend package. This flaw allows unauthorized access to content within AWS S3 or Google Cloud Storage (GCS) buckets used by TechDocs, potentially exposing sensitive information and bypassing permission controls. The vulnerability impacts versions prior to 1.10.13, and a patch has been released in version 1.10.13.
The core impact of CVE-2024-45816 lies in its ability to bypass access controls within the TechDocs storage configuration. When using AWS S3 or GCS as the storage provider, an attacker can craft malicious requests to traverse the directory structure and access files outside of the intended TechDocs content. This could lead to the exposure of confidential data stored in the bucket, such as configuration files, API keys, or even other application data. The blast radius extends to any data stored in the S3/GCS bucket, regardless of its intended purpose, as the attacker effectively gains unrestricted read access. This vulnerability is particularly concerning because it can be exploited without authentication, making it a high-risk exposure for organizations relying on Backstage and its TechDocs plugin.
CVE-2024-45816 was publicly disclosed on September 17, 2024. Currently, there are no known public exploits or active campaigns targeting this vulnerability. The vulnerability is not listed on the CISA KEV catalog as of this writing. The ease of exploitation, coupled with the potential for data leakage, suggests that this vulnerability could become a target for opportunistic attackers.
Exploit Status
EPSS
0.21% (43% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2024-45816 is to immediately upgrade the @backstage/plugin-techdocs-backend package to version 1.10.13 or later. If an immediate upgrade is not feasible due to compatibility concerns or breaking changes, consider implementing stricter access controls on the S3/GCS bucket. This includes limiting the permissions granted to the TechDocs service account and implementing bucket policies that restrict access to specific directories. While not a complete solution, these measures can reduce the potential impact of a successful exploit. Regularly review and audit the permissions granted to the TechDocs service account to ensure they adhere to the principle of least privilege. After upgrading, confirm the fix by attempting to access files outside the intended TechDocs directory via the TechDocs API; access should be denied.
Actualice el paquete `@backstage/plugin-techdocs-backend` a la versión 1.10.13 o superior. Esto corrige la vulnerabilidad de recorrido de directorios en el bucket de almacenamiento. Ejecute `npm install @backstage/plugin-techdocs-backend@latest` o `yarn upgrade @backstage/plugin-techdocs-backend@latest` para actualizar.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2024-45816 is a Directory Traversal vulnerability in the @backstage/plugin-techdocs-backend package, allowing unauthorized access to files in AWS S3 or GCS storage buckets.
You are affected if you are using @backstage/plugin-techdocs-backend versions prior to 1.10.13 and utilize AWS S3 or Google Cloud Storage for TechDocs storage.
Upgrade the @backstage/plugin-techdocs-backend package to version 1.10.13 or later. Consider stricter S3/GCS bucket access controls as an interim measure.
As of September 2024, there are no confirmed reports of active exploitation, but the vulnerability's ease of exploitation warrants caution.
Refer to the Backstage repository on GitHub: https://github.com/backstage/backstage
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.