Skip to content

Commit 14821b7

Browse files
committed
remove incomplete issues, add completed ones
Signed-off-by: Nick Boldt <[email protected]>
1 parent 31ac184 commit 14821b7

File tree

2 files changed

+11
-12
lines changed

2 files changed

+11
-12
lines changed
Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
# CVE number, affected package, fixed in version(s), JIRA
2-
CVE-2024-21534,jsonpath-plus,10.0.0,RHIDP-4440
3-
CVE-2024-47762,@backstage/plugin-app-backend,0.3.75,RHIDP-4321
4-
CVE-2024-45816,@backstage/plugin-techdocs-backend,1.10.13,RHIDP-4116
5-
CVE-2024-37890,ws,8.17.1||7.5.10||6.2.3||5.2.4,RHIDP-2733
2+
3+
# not yet fixed, built, or ready for release
4+
# CVE-2024-21534,jsonpath-plus,10.0.0,RHIDP-4440
5+
# CVE-2024-47762,@backstage/plugin-app-backend,0.3.75,RHIDP-4321
6+
# CVE-2024-45816,@backstage/plugin-techdocs-backend,1.10.13,RHIDP-4116
7+
# CVE-2024-37890,ws,8.17.1||7.5.10||6.2.3||5.2.4,RHIDP-2733
8+
9+
CVE-2024-45816,@backstage/plugin-techdocs-backend,1.10.13,RHIDP-4117
10+
CVE-2024-46976,@backstage/plugin-techdocs-backend,1.10.13,RHIDP-4114
Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,7 @@
11
= {product} dependency updates
22

3-
link:https://access.redhat.com/security/cve/CVE-2024-21534[CVE-2024-21534]::
4-
A flaw was found in jsonpath-plus. This vulnerability allows remote code execution via improper input sanitisation and unsafe default usage of the vm module in Node.js. Attackers can exploit this by executing arbitrary code through the unsafe use of the vm module in Node.js, which allows for malicious code injection. This issue occurs due to the way jsonpath-plus evaluates JSON paths using vm, a Node.js module that allows code execution. If user input is not properly sanitized, an attacker can craft JSON paths that execute dangerous commands, such as reading sensitive files.
5-
6-
link:https://access.redhat.com/security/cve/CVE-2024-37890[CVE-2024-37890]::
7-
A flaw was found in the Node.js WebSocket library (ws). A request with several headers exceeding the 'server.maxHeadersCount' threshold could be used to crash a ws server, leading to a denial of service.
8-
93
link:https://access.redhat.com/security/cve/CVE-2024-45816[CVE-2024-45816]::
104
A directory traversal vulnerability was found in the backstage/plugin-techdocs-backend package. When using the AWS S3 or GCS storage provider for TechDocs, it is possible to access content in the entire storage bucket. This can leak contents of the bucket that are not intended to be accessible, as well as bypass permission checks in Backstage.
115

12-
link:https://access.redhat.com/security/cve/CVE-2024-47762[CVE-2024-47762]::
13-
A flaw was found in the backstage/plugin-app-backend package. Configurations supplied through APP_CONFIG_* environment variables unexpectedly ignore the visibility defined in the configuration schema, potentially exposing sensitive configuration details intended to remain private or restricted to backend processes.
6+
link:https://access.redhat.com/security/cve/CVE-2024-46976[CVE-2024-46976]::
7+
A flaw was found in the backstage/plugin-techdocs-backend package. An attacker with control of the contents of the TechDocs storage buckets may be able to inject executable scripts in the TechDocs content that will be executed in the victim's browser when browsing documentation or navigating to an attacker provided link.

0 commit comments

Comments
 (0)