Your Yello Ring Road To Success
GOOGLE LOGIN MY ADS MY SHOP

Critical RCE Flaw Reported in Spotify’s Backstage Software Catalog and Developer Platform

Backstage Software Catalog and Developer Platform

Spotify’s Backstage has been discovered as vulnerable to a
severe security flaw that could be exploited to gain remote code
execution by leveraging a recently disclosed bug in a third-party
module.

The vulnerability (CVSS score: 9.8), at its core, takes
advantage of a critical sandbox escape in vm2, a popular JavaScript
sandbox library (CVE-2022-36067[1]
aka Sandbreak), that came to light last month.

“An unauthenticated threat actor can execute arbitrary system
commands on a Backstage application by exploiting a vm2 sandbox
escape in the Scaffolder core plugin,” application security firm
Oxeye said in a report[2]
shared with The Hacker News.

Backstage[3]
is an open source developer portal[4]
from Spotify that allows users to create, manage, and explore
software components from a unified “front door[5].” It’s used by many companies[6]
like Netflix, DoorDash, Roku, and Expedia, among others.

According to Oxeye, the flaw is rooted in a tool called software templates[7]
that can be used to create components within Backstage.

Backstage Software Catalog and Developer Platform
Screenshot shows Backstage calling the
renderTemplate function (that calls renderString2) twice in the
event of an error.

While the template engine utilizes vm2 to mitigate the risk
associated with running untrusted code, the sandbox escape flaw in
the latter made it possible to execute arbitrary system commands
outside of the security perimeter.

Oxeye said it was able to identify more than 500
publicly-exposed Backstage instances on the internet, which could
then be remotely weaponized by an adversary without requiring any
authorization.

image CyberSecurity

Following responsible disclosure on August 18, the issue was
addressed by the project maintainers in version 1.5.1[8]
released on August 29, 2022.

“The root of any template-based VM escape is gaining JavaScript
execution rights within the template,” the Israeli company noted.
“By using ‘logic-less’ template engines such as Mustache[9], you can avoid
introducing server-side template injection vulnerabilities.”

“Separating the logic from the presentation as much as possible
can greatly reduce your exposure to the most dangerous
template-based attacks,” it further added.

References

  1. ^
    CVE-2022-36067
    (thehackernews.com)
  2. ^
    report
    (www.oxeye.io)
  3. ^
    Backstage
    (github.com)
  4. ^
    developer portal
    (backstage.io)
  5. ^
    front
    door
    (engineering.atspotify.com)
  6. ^
    many
    companies
    (github.com)
  7. ^
    software
    templates
    (backstage.io)
  8. ^
    version
    1.5.1
    (github.com)
  9. ^
    Mustache
    (mustache.github.io)

Read more