Skip to content

Commit e8830ff

Browse files
1 parent 80e8489 commit e8830ff

File tree

1 file changed

+68
-0
lines changed

1 file changed

+68
-0
lines changed
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-8qp7-fhr9-fw53",
4+
"modified": "2026-03-05T00:23:51Z",
5+
"published": "2026-03-05T00:23:51Z",
6+
"aliases": [
7+
"CVE-2026-29184"
8+
],
9+
"summary": "@backstage/plugin-scaffolder-backend Vulnerable to Potential Session Token Exfiltration via Log Redaction Bypass",
10+
"details": "### Impact\n\nA malicious scaffolder template can bypass the log redaction mechanism to exfiltrate secrets provided run through task event logs.\n\nThe attack requires:\n - The ability to register a template in the catalog\n - A victim who executes the malicious template\n\n### Patches\n Patched in `@backstage/plugin-scaffolder-backend` version 3.1.4\n\n### Workarounds\n - Implement a custom permission policy that restricts scaffolder.task.read so users can only read their own task logs\n - Restrict who can register templates in the catalog to trusted users only\n\n### Resources\n - Backstage Scaffolder permissions documentation: https://backstage.io/docs/permissions/plugin-authors/01-setup/\n - Backstage Threat Model: https://backstage.io/docs/overview/threat-model/",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "@backstage/plugin-scaffolder-backend"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "3.1.4"
32+
}
33+
]
34+
}
35+
],
36+
"database_specific": {
37+
"last_known_affected_version_range": "<= 3.1.3"
38+
}
39+
}
40+
],
41+
"references": [
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/backstage/backstage/security/advisories/GHSA-8qp7-fhr9-fw53"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://backstage.io/docs/overview/threat-model"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://backstage.io/docs/permissions/plugin-authors/01-setup"
53+
},
54+
{
55+
"type": "PACKAGE",
56+
"url": "https://github.com/backstage/backstage"
57+
}
58+
],
59+
"database_specific": {
60+
"cwe_ids": [
61+
"CWE-532"
62+
],
63+
"severity": "LOW",
64+
"github_reviewed": true,
65+
"github_reviewed_at": "2026-03-05T00:23:51Z",
66+
"nvd_published_at": null
67+
}
68+
}

0 commit comments

Comments
 (0)