Vulnerability Details CVE-2021-32662
Backstage is an open platform for building developer portals, and techdocs-common contains common functionalities for Backstage's TechDocs. In `@backstage/techdocs-common` versions prior to 0.6.3, a malicious actor could read sensitive files from the environment where TechDocs documentation is built and published by setting a particular path for `docs_dir` in `mkdocs.yml`. These files would then be available over the TechDocs backend API. This vulnerability is mitigated by the fact that an attacker would need access to modify the `mkdocs.yml` in the documentation source code, and would also need access to the TechDocs backend API. The vulnerability is patched in the `0.6.3` release of `@backstage/techdocs-common`.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.005
EPSS Ranking 64.1%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 3.5
Products affected by CVE-2021-32662
-
cpe:2.3:a:linuxfoundation:backstage:0.1.0
-
cpe:2.3:a:linuxfoundation:backstage:0.1.1
-
cpe:2.3:a:linuxfoundation:backstage:0.2.0
-
cpe:2.3:a:linuxfoundation:backstage:0.3.0
-
cpe:2.3:a:linuxfoundation:backstage:0.3.1
-
cpe:2.3:a:linuxfoundation:backstage:0.3.2
-
cpe:2.3:a:linuxfoundation:backstage:0.4.0
-
cpe:2.3:a:linuxfoundation:backstage:0.4.1
-
cpe:2.3:a:linuxfoundation:backstage:0.4.2
-
cpe:2.3:a:linuxfoundation:backstage:0.4.3
-
cpe:2.3:a:linuxfoundation:backstage:0.4.4
-
cpe:2.3:a:linuxfoundation:backstage:0.5.0
-
cpe:2.3:a:linuxfoundation:backstage:0.6.0