CVE-2023-35147 – org.jenkins-ci.plugins:aws-codecommit-trigger
Package
Manager: maven
Name: org.jenkins-ci.plugins:aws-codecommit-trigger
Vulnerable Version: >=0 <=3.0.12
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00049 pctl0.14898
Details
Arbitrary file read vulnerability in Jenkins AWS CodeCommit Trigger Plugin Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not restrict the AWS SQS queue name path parameter in an HTTP endpoint, allowing attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller file system.
Metadata
Created: 2023-06-14T15:30:37Z
Modified: 2024-01-30T23:02:44Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/06/GHSA-whgj-6m78-2gg9/GHSA-whgj-6m78-2gg9.json
CWE IDs: ["CWE-732"]
Alternative ID: GHSA-whgj-6m78-2gg9
Finding: F039
Auto approve: 1