Miggo Logo

CVE-2023-35926:
Backstage Scaffolder plugin has insecure sandbox

8.1

CVSS Score
3.1

Basic Information

EPSS Score
0.83761%
Published
6/21/2023
Updated
11/11/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
@backstage/plugin-scaffolder-backendnpm< 1.15.01.15.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the use of vm2 library for sandboxing template execution. The commit diff shows replacement of vm2 with isolated-vm in SecureTemplater.ts, indicating this was the vulnerable implementation point. While the exact function name isn't shown in the diff, the SecureTemplater class is directly responsible for sandboxed template execution. The CWE-94 (Code Injection) classification and advisory details confirm this was an insecure code generation control issue in the sandbox implementation. The high confidence comes from: 1) Explicit library replacement in the patch, 2) CWE mapping to code injection in templating, 3) Advisory stating RCE via template manipulation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** ***kst*** s****ol**r-***k*n* plu*in us*s * t*mpl*tin* li*r*ry t**t r*quir*s * s*n**ox, *s it *y **si*n *llows *or *o** inj**tion. T** li*r*ry us** *or t*is s*n**ox so **r **s ***n `vm*`, *ut in li**t o* s*v*r*l p*st vuln*r**iliti*s *n* *xistin* v

Reasoning

T** vuln*r**ility st*ms *rom t** us* o* `vm*` li*r*ry *or s*n**oxin* t*mpl*t* *x**ution. T** *ommit *i** s*ows r*pl***m*nt o* `vm*` wit* `isol*t**-vm` in `S**ur*T*mpl*t*r.ts`, in*i**tin* t*is w*s t** vuln*r**l* impl*m*nt*tion point. W*il* t** *x**t `