Description
Backstage is an open platform for building developer portals, and techdocs-common contains common functionalities for Backstage's TechDocs. In `@backstage/techdocs-common` versions prior to 0.6.3, a malicious actor could read sensitive files from the environment where TechDocs documentation is built and published by setting a particular path for `docs_dir` in `mkdocs.yml`. These files would then be available over the TechDocs backend API. This vulnerability is mitigated by the fact that an attacker would need access to modify the `mkdocs.yml` in the documentation source code, and would also need access to the TechDocs backend API. The vulnerability is patched in the `0.6.3` release of `@backstage/techdocs-common`.
Remediation
References
https://github.com/backstage/backstage/commit/8cefadca04cbf01d0394b0cb1983247e5f1d6208
https://github.com/backstage/backstage/releases/tag/release-2021-05-27
https://github.com/backstage/backstage/security/advisories/GHSA-pgf8-28gg-vpr6
Related Vulnerabilities
CVE-2013-4366 Vulnerability in maven package org.apache.httpcomponents:httpclient
CVE-2022-25204 Vulnerability in maven package by.dev.madhead.doktor:doktor
CVE-2021-25924 Vulnerability in maven package cd.go.plugin:go-plugin-api
CVE-2018-1000644 Vulnerability in maven package org.eclipse.rdf4j:rdf4j-rio-rdfxml
CVE-2023-25500 Vulnerability in maven package com.vaadin:flow-server