AWS SAM Plugin 1.2.2 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to configure a job or control the contents of a previously configured \"AWS SAM deploy application\" build step’s YAML SAM template file (template.yaml or equivalent) file.
AWS SAM Plugin 1.2.3 configures its YAML parser to only instantiate safe types.
{
"nvd_published_at": "2020-04-16T19:15:00Z",
"github_reviewed_at": "2022-12-16T22:59:59Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-502"
],
"severity": "HIGH"
}