Friday, March 31, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > RCE vulnerability found in Spotify’s Backstage

RCE vulnerability found in Spotify’s Backstage

Security researchers found a critical remote code execution vulnerability in Spotify's Backstage project.


Erdem Yasar Erdem Yasar
November 17, 2022
4 min read
RCE vulnerability found in Spotify's Backstage
  • The Oxeye research team has been able to execute remote code in Spotify’s open-source, CNCF-incubated project, Backstage.
  • The vulnerability, which has a CVSS score of 9.8, can be exploited by VM sandbox escape through the vm2 third-party library.
  • Oxeye reported the vulnerability and it was fixed shortly after. Organizations using Backstage are urged to install the latest patch immediately.

The Oxeye research team announced that they could gain remote code execution in Backstage, Spotify‘s open-source CNCF-incubated project. To execute remote code, the team exploited a VM sandbox escape through the vm2 third-party library. The RCE vulnerability has been reported via Spotify’s bug bounty program and patched shortly after in version 1.5.1. The vulnerability can be tracked as CVE-2022-36067 and has a CVSS score of 9.8.

Open-source CNCF-incubated project

The remote code execution vulnerability, which may allow threat actors to execute arbitrary system commands on a Backstage application, can be exploited with a vm2 sandbox escape in the Scaffolder core plugin. Backstage is currently being used by American Airlines, Netflix, Splunk, Fidelity Investments, and Epic Games along with Spotify. Successful exploitation has critical implications for any affected organization and can compromise those services and the data they hold. Backstage includes:

  • Backstage software catalog for managing all your software (microservices, libraries, data pipelines, websites, ML models, etc.)
  • Backstage software templates for quickly spinning up new projects and standardizing your tooling with your organization’s best practices
  • Backstage techdocs for making it easy to create, maintain, find, and use technical documentation, using a “docs-like code” approach
  • A growing ecosystem of open-source plugins that further expand its customizability and functionality

Backstage has three parts:

  • Core: Base functionality built by core developers in the open-source project
  • App: A Backstage app instance that is deployed and tweaked. It ties together core functionality with additional plugins. It’s built and maintained by app developers, usually by a productivity team at a company.
  • Plugins: Additional functionality to make your Backstage app more useful. Plugins can be specific to a company or open-sourced/reusable.

Backstage started using the vm2 JavaScript sandbox library to mitigate another risk. Oxeye researchers found a vm2 sandbox escape vulnerability, causing the remote code execution on the hosting machine. Oxeye explained the steps for exploitation:

  1. Access the range function constructor property, which provides access to the sandboxed Function constructor. We use that to create an immediately invoked function expression (IIFE) containing our exploit code (within Nunjucks’s rendering engine context).
  2. Override the renderString function to contain our own implementation, This is so we can run in the context of the VM instead of Nunjucks. This is essential to exploit the vulnerability (here env is the Nunjucks reference).
  3. Trigger an error by invoking an undefined function (triggerException). This causes NunjucksWorkflowRunner.render to call the SecureTemplater.render function a second time.
  4. Save a copy of the original Error class.
  5. Override the original Error class with a new empty class.
  6. Implement the prepareStackTrace function under the newly created Error class.
  7. Create an instance of the saved Error class and access its stack property. This triggers the built-in Node error module to call our implementation of the prepareStackTrace function.
  8. Access the CallSite object supplied in the traces array, on which we invoke the getThis function. This gets us an object created outside the sandbox, allowing us to execute an arbitrary system command.

Oxeye said,

« If you’re using Backstage in your organization, we strongly recommend updating it to the latest version to defend against this vulnerability as soon as possible. 

Moreover, if you’re using a template engine in your application, make sure you choose the right one in relation to security. Robust template engines are extremely useful but might pose a risk to your organization. 

The root of any template-based VM escape is gaining JavaScript execution rights within the template. By using “logic-less” template engines such as Mustache, you can avoid introducing server-side template injection vulnerabilities. Separating the logic from the presentation as much as possible can greatly reduce your exposure to the most dangerous template-based attacks. »

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Tags: Oxeye
Erdem Yasar

Erdem Yasar

Erdem Yasar is a news editor at Cloud7. Erdem started his career by writing video game reviews in 2007 for PC World magazine while he was studying computer engineering. In the following years, he focused on software development with various programming languages. After his graduation, he continued to work as an editor for several major tech-related websites and magazines. During the 2010s, Erdem Yasar shifted his focus to cloud computing, hosting, and data centers as they were becoming more popular topics in the tech industry. Erdem Yasar also worked with various industry-leading tech companies as a content creator by writing blog posts and other articles. Prior to his role at Cloud7, Erdem was the managing editor of T3 Magazine.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
WP Engine launches Managed WordPress Platform on Microsoft Azure

WP Engine launches Managed WordPress Platform on Microsoft Azure

Related News

7 best practices and tools to use for Linux security

7 best practices and tools to use for Linux security

March 24, 2023 5:00 pm
CISA aims to identify vulnerabilities that attract ransomware

CISA aims to identify vulnerabilities that attract ransomware

March 22, 2023 2:10 pm
7 best cybersecurity schools

7 best cybersecurity schools

March 21, 2023 9:00 pm
Akamai researchers warn about the new HinataBot botnet

Akamai researchers warn about the new HinataBot botnet

March 20, 2023 6:10 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • IBM Cloud Direct Link now available on Cologix Access Marketplace
  • WordPress 6.2 “Dolphy” is now available
  • Vega Cloud guarantees minimum 10% savings on monthly cloud spend
  • [Event] Grab your DeveloperWeek Europe 2023 ticket free
  • How to get Linux ready for gaming

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.