Path Parameter Vulnerability in Jenkins AWS CodeCommit Trigger Plugin
CVE-2023-35147
6.5MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 14 June 2023
Summary
The AWS CodeCommit Trigger Plugin in Jenkins up to version 3.0.12 contains a vulnerability that allows unauthorized access to arbitrary files on the Jenkins controller file system. This occurs due to insufficient restriction on the AWS SQS queue name path parameter in an HTTP endpoint. An attacker with Item/Read permission can exploit this flaw to potentially exfiltrate sensitive data from the file system.
Affected Version(s)
Jenkins AWS CodeCommit Trigger Plugin 0 <= 3.0.12
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved