First published: Mon Mar 31 2025(Updated: )
After completing a build with AWS Serverless Application Model Command Line Interface (SAM CLI) which include symlinks, the content of those symlinks are copied to the cache of the local workspace as regular files or directories. As a result, a user who does not have access to those symlinks outside of the Docker container would now have access via the local workspace. Users should upgrade to version 1.134.0 and ensure any forked or derivative code is patched to incorporate the new fixes. After upgrading, users must re-build their applications using the sam build --use-container to update the symlinks.
Credit: ff89ba41-3aa1-4d27-914a-91399e9639e5
Affected Software | Affected Version | How to fix |
---|---|---|
AWS Serverless Application Model CLI | <1.134.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3048 is classified as a medium severity vulnerability.
CVE-2025-3048 affects versions of AWS Serverless Application Model Command Line Interface up to but not including 1.134.0.
To fix CVE-2025-3048, upgrade your AWS Serverless Application Model Command Line Interface to version 1.134.0 or later.
CVE-2025-3048 is a vulnerability related to improper handling of symlinks in the AWS Serverless Application Model Command Line Interface.
Yes, CVE-2025-3048 can lead to unauthorized access to sensitive data due to improper caching of symlink contents.