Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-whgj-6m78-2gg9

Опубликовано: 14 июн. 2023
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

Arbitrary file read vulnerability in Jenkins AWS CodeCommit Trigger Plugin

Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not restrict the AWS SQS queue name path parameter in an HTTP endpoint, allowing attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller file system.

Пакеты

Наименование

org.jenkins-ci.plugins:aws-codecommit-trigger

maven
Затронутые версииВерсия исправления

<= 3.0.12

Отсутствует

EPSS

Процентиль: 21%
0.00067
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-732

Связанные уязвимости

CVSS3: 6.5
redhat
больше 2 лет назад

Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not restrict the AWS SQS queue name path parameter in an HTTP endpoint, allowing attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller file system.

CVSS3: 6.5
nvd
больше 2 лет назад

Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not restrict the AWS SQS queue name path parameter in an HTTP endpoint, allowing attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller file system.

EPSS

Процентиль: 21%
0.00067
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-732