Path Parameter Vulnerability in Jenkins AWS CodeCommit Trigger Plugin
CVE-2023-35147

6.5MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
14 June 2023

Summary

The AWS CodeCommit Trigger Plugin in Jenkins up to version 3.0.12 contains a vulnerability that allows unauthorized access to arbitrary files on the Jenkins controller file system. This occurs due to insufficient restriction on the AWS SQS queue name path parameter in an HTTP endpoint. An attacker with Item/Read permission can exploit this flaw to potentially exfiltrate sensitive data from the file system.

Affected Version(s)

Jenkins AWS CodeCommit Trigger Plugin 0 <= 3.0.12

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.