Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:41018
HistoryJun 26, 2023 - 10:19 a.m.

Arbitrary File Read

2023-06-2610:19:50
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
5
arbitrary file read
aws codecommit
jenkins controller

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

45.5%

AWS CodeCommit Trigger Plugin is vulnerable to Arbitrary File Reads. The vulnerability exists due to a failure to restrict the queue name path parameter in the corresponding HTTP endpoint which allows an attacker to read arbitrary files on the Jenkins controller file system.

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

45.5%