Path Parameter Vulnerability in Jenkins AWS CodeCommit Trigger Plugin
CVE-2023-35147
6.5MEDIUM
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 14 June 2023
What is CVE-2023-35147?
The AWS CodeCommit Trigger Plugin in Jenkins up to version 3.0.12 contains a vulnerability that allows unauthorized access to arbitrary files on the Jenkins controller file system. This occurs due to insufficient restriction on the AWS SQS queue name path parameter in an HTTP endpoint. An attacker with Item/Read permission can exploit this flaw to potentially exfiltrate sensitive data from the file system.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins AWS CodeCommit Trigger Plugin 0 <= 3.0.12
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved