CVE-2023-35147:
Arbitrary file read vulnerability in Jenkins AWS CodeCommit Trigger Plugin
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.15213%
CWE
Published
6/14/2023
Updated
1/30/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:aws-codecommit-trigger | maven | <= 3.0.12 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper handling of the AWS SQS queue name parameter in an HTTP
endpoint. While exact method names aren't disclosed in available sources, the advisory explicitly states that the queue name path parameter wasn't restricted. This would manifest in code that takes user-supplied queue names and uses them directly in file system operations without path validation. The plugin's purpose (SQS
integration) and CWE-732
context indicate the vulnerable function is likely the endpoint handler responsible for retrieving queue activity logs, where input sanitization was missing.