Логотип exploitDog
bind:CVE-2023-35147
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-35147

Количество 3

Количество 3

redhat логотип

CVE-2023-35147

больше 2 лет назад

Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not restrict the AWS SQS queue name path parameter in an HTTP endpoint, allowing attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller file system.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2023-35147

больше 2 лет назад

Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not restrict the AWS SQS queue name path parameter in an HTTP endpoint, allowing attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller file system.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-whgj-6m78-2gg9

больше 2 лет назад

Arbitrary file read vulnerability in Jenkins AWS CodeCommit Trigger Plugin

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2023-35147

Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not restrict the AWS SQS queue name path parameter in an HTTP endpoint, allowing attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller file system.

CVSS3: 6.5
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-35147

Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not restrict the AWS SQS queue name path parameter in an HTTP endpoint, allowing attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller file system.

CVSS3: 6.5
0%
Низкий
больше 2 лет назад
github логотип
GHSA-whgj-6m78-2gg9

Arbitrary file read vulnerability in Jenkins AWS CodeCommit Trigger Plugin

CVSS3: 6.5
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу