Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not restrict the AWS SQS queue name path parameter in an HTTP endpoint, allowing attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller file system.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1900 | Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not restrict the AWS SQS queue name path parameter in an HTTP endpoint, allowing attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller file system. |
Github GHSA |
GHSA-whgj-6m78-2gg9 | Arbitrary file read vulnerability in Jenkins AWS CodeCommit Trigger Plugin |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 31 Dec 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-12-31T17:20:31.945Z
Reserved: 2023-06-14T08:58:33.245Z
Link: CVE-2023-35147
Updated: 2024-08-02T16:23:59.318Z
Status : Modified
Published: 2023-06-14T13:15:12.167
Modified: 2024-12-31T18:15:24.223
Link: CVE-2023-35147
OpenCVE Enrichment
No data.
EUVD
Github GHSA