First published: Wed Jun 14 2023(Updated: )
Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not restrict the AWS SQS queue name path parameter in an HTTP endpoint, allowing attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Aws Codecommit Trigger | <=3.0.12 | |
maven/org.jenkins-ci.plugins:aws-codecommit-trigger | <=3.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Jenkins AWS CodeCommit Trigger Plugin vulnerability is CVE-2023-35147.
The severity of CVE-2023-35147 is medium with a CVSS score of 6.5.
The affected software is Jenkins AWS CodeCommit Trigger Plugin versions up to and including 3.0.12.
This vulnerability allows attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller file system.
To fix CVE-2023-35147, you should upgrade to a version of Jenkins AWS CodeCommit Trigger Plugin that is not affected by this vulnerability.