Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-35147

Опубликовано: 14 июн. 2023
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not restrict the AWS SQS queue name path parameter in an HTTP endpoint, allowing attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller file system.

Отчет

The Jenkins AWS CodeCommit Trigger Plugin is not shipped in any of the Red Hat products. Hence, closing as not a bug.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Cryostat 2jenkins-2-pluginsNot affected
Node HealthCheck Operatorjenkins-2-pluginsNot affected
OpenShift Developer Tools and Servicesjenkins-2-pluginsAffected
Red Hat OpenShift Container Platform 3.11jenkins-2-pluginsAffected
Red Hat OpenShift Container Platform 4jenkins-2-pluginsAffected

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=2215090jenkins-2-plugins: aws-codecommit-trigger: Arbitrary file read vulnerability in AWS CodeCommit Trigger Plugin

EPSS

Процентиль: 21%
0.00067
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
больше 2 лет назад

Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not restrict the AWS SQS queue name path parameter in an HTTP endpoint, allowing attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller file system.

CVSS3: 6.5
github
больше 2 лет назад

Arbitrary file read vulnerability in Jenkins AWS CodeCommit Trigger Plugin

EPSS

Процентиль: 21%
0.00067
Низкий

6.5 Medium

CVSS3