Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:41018
HistoryJun 26, 2023 - 10:19 a.m.

Arbitrary File Read

2023-06-2610:19:50
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
10
arbitrary file read
aws codecommit
jenkins controller

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

45.5%

AWS CodeCommit Trigger Plugin is vulnerable to Arbitrary File Reads. The vulnerability exists due to a failure to restrict the queue name path parameter in the corresponding HTTP endpoint which allows an attacker to read arbitrary files on the Jenkins controller file system.

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

45.5%