First published: Mon Mar 31 2025(Updated: )
When running the AWS Serverless Application Model Command Line Interface (SAM CLI) build process with Docker and symlinks are included in the build files, the container environment allows a user to access privileged files on the host by leveraging the elevated permissions granted to the tool. A user could leverage the elevated permissions to access restricted files via symlinks and copy them to a more permissive location on the container. Users should upgrade to v1.133.0 or newer and ensure any forked or derivative code is patched to incorporate the new fixes.
Credit: ff89ba41-3aa1-4d27-914a-91399e9639e5
Affected Software | Affected Version | How to fix |
---|---|---|
AWS Serverless Application Model Command Line Interface | <1.133.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3047 is classified as a high-severity vulnerability due to the risk of unauthorized access to privileged files on the host.
To fix CVE-2025-3047, update the AWS Serverless Application Model CLI to a version higher than 1.133.0.
CVE-2025-3047 affects AWS Serverless Application Model CLI versions up to 1.133.0.
CVE-2025-3047 allows attackers to access privileged files on the host system by leveraging elevated permissions granted to the Docker container.
Yes, CVE-2025-3047 specifically affects scenarios where the AWS SAM CLI build process is conducted with Docker and involves symlinked files.