logo

CVE-2023-35147 org.jenkins-ci.plugins:aws-codecommit-trigger

Package

Manager: maven
Name: org.jenkins-ci.plugins:aws-codecommit-trigger
Vulnerable Version: >=0 <=3.0.12

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00049 pctl0.14898

Details

Arbitrary file read vulnerability in Jenkins AWS CodeCommit Trigger Plugin Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not restrict the AWS SQS queue name path parameter in an HTTP endpoint, allowing attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller file system.

Metadata

Created: 2023-06-14T15:30:37Z
Modified: 2024-01-30T23:02:44Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/06/GHSA-whgj-6m78-2gg9/GHSA-whgj-6m78-2gg9.json
CWE IDs: ["CWE-732"]
Alternative ID: GHSA-whgj-6m78-2gg9
Finding: F039
Auto approve: 1