Vulnerability Details : CVE-2021-43776
Backstage is an open platform for building developer portals. In affected versions the auth-backend plugin allows a malicious actor to trick another user into visiting a vulnerable URL that executes an XSS attack. This attack can potentially allow the attacker to exfiltrate access tokens or other secrets from the user's browser. The default CSP does prevent this attack, but it is expected that some deployments have these policies disabled due to incompatibilities. This is vulnerability is patched in version `0.4.9` of `@backstage/plugin-auth-backend`.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2021-43776
- cpe:2.3:a:linuxfoundation:auth_backend:*:*:*:*:*:node.js:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-43776
0.31%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 54 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-43776
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST | |
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
NIST | |
7.4
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N |
2.8
|
4.0
|
GitHub, Inc. |
CWE ids for CVE-2021-43776
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: security-advisories@github.com (Primary)
References for CVE-2021-43776
-
https://github.com/backstage/backstage/tree/master/plugins/auth-backend
backstage/plugins/auth-backend at master · backstage/backstage · GitHubProduct;Third Party Advisory
-
https://github.com/backstage/backstage/security/advisories/GHSA-w7fj-336r-vw49
Reflected XSS vulnerability in @backstage/plugin-auth-backend · Advisory · backstage/backstage · GitHubThird Party Advisory
Jump to