» » Organizations Warned of Critical Vulnerability in Backstage Developer Portal Platform

Organizations Warned of Critical Vulnerability in Backstage Developer Portal Platform

Organizations Warned of Critical Vulnerability in Backstage Developer Portal Platform

Dwelling › Vulnerabilities

Organizations Warned of Essential Vulnerability in Backstage Developer Portal Platform

By Eduard Kovacs on November 15, 2022

Tweet

Backstage, an open platform for constructing developer portals, is affected by a crucial vulnerability whose exploitation might have a severe influence on a focused enterprise, in accordance with cloud-native software safety agency Oxeye.

Backstage was developed by Spotify and donated to the Cloud Native Computing Basis. It supplies a catalog for managing the entire person’s software program, software program templates to make it simpler to create initiatives, and open supply plugins that can be utilized to broaden its customizability and performance.

The platform is utilized by many main organizations, together with Netflix, American Airways, Doordash, Palo Alto Networks, HP, Siemens, LinkedIn, and Booz Allen Hamilton.

Backstage is affected by a crucial vulnerability associated to a safety gap discovered earlier this yr by Oxeye within the standard sandbox library VM2. The VM2 flaw, dubbed SandBreak and tracked as CVE-2022-36067, can permit a distant attacker to flee the sandbox and execute arbitrary code on the host.

Backstage has been utilizing VM2 and Oxeye researchers found that CVE-2022-36067 may be exploited for unauthenticated distant code execution in Backstage by abusing its software program templates. An attacker who can efficiently exploit the vulnerability might perform varied actions within the compromised group’s community.

“Backstage can maintain integration particulars to many group techniques, reminiscent of Prometheus, Jira, ElasticSearch, and others. Thus, profitable exploitation has crucial implications for any affected group and may compromise these providers and the information they maintain,” Oxeye mentioned in a technical weblog publish describing the vulnerability.

Oxeye reported its findings to Backstage builders via Spotify’s bug bounty program in mid-August and the flaw was mounted roughly 10 days later with the discharge of model 1.5.1, which features a patched model of VM2.

“In case you’re utilizing a template engine in your software, be sure you select the fitting one in relation to safety. Sturdy template engines are extraordinarily helpful however would possibly pose a danger to your group,” the safety agency really helpful.

Associated: U.S. Authorities, Tech Giants Talk about Open Supply Software program Safety

Associated: Lecturers Devise Open Supply Device For Searching Node.js Safety Flaws

Associated: Essential Vulnerabilities Present in System42 Asset Administration Platform

Get the Every day Briefing

 
 
 

  • Most Latest
  • Most Learn
  • Zendesk Vulnerability May Have Given Hackers Entry to Buyer Knowledge
  • Bishop Fox Provides $46 Million to Sequence B Funding Spherical
  • Chinese language Cyberespionage Group ‘Billbug’ Targets Certificates Authority
  • Lengthy-Standing Chinese language Cybercrime Marketing campaign Spoofs Over 400 Manufacturers
  • Organizations Warned of Essential Vulnerability in Backstage Developer Portal Platform
  • Swimlane Launches Safety Automation Ecosystem for OT
  • Threat Mitigation Methods to Shut the XIoT Safety Hole
  • 40 States Settle Google Location-Monitoring Expenses for $392M
  • Canadian Grocery store Chain Sobeys Hit by Ransomware Assault
  • Aiphone Intercom System Vulnerability Permits Hackers to Open Doorways

Searching for Malware in All of the Unsuitable Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Pc Says About You

Be in a Place to Act By way of Cyber Situational Consciousness

Report Exhibits Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice Yr To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

Methods to Establish Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Enticing

Methods to Defend Towards DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Considering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles