GHSA-qrm8-cw73-r9w8

Suggest an improvement
Source
https://github.com/advisories/GHSA-qrm8-cw73-r9w8
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-qrm8-cw73-r9w8/GHSA-qrm8-cw73-r9w8.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-qrm8-cw73-r9w8
Aliases
Published
2022-05-24T17:15:35Z
Modified
2024-02-16T08:24:22.545766Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
RCE vulnerability in Jenkins AWS SAM Plugin
Details

AWS SAM Plugin 1.2.2 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to configure a job or control the contents of a previously configured \"AWS SAM deploy application\" build step’s YAML SAM template file (template.yaml or equivalent) file.

AWS SAM Plugin 1.2.3 configures its YAML parser to only instantiate safe types.

Database specific
{
    "nvd_published_at": "2020-04-16T19:15:00Z",
    "cwe_ids": [
        "CWE-502"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2022-12-16T22:59:59Z"
}
References

Affected packages

Maven / io.jenkins.plugins:aws-sam

Package

Name
io.jenkins.plugins:aws-sam
View open source insights on deps.dev
Purl
pkg:maven/io.jenkins.plugins/aws-sam

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.3

Affected versions

1.*

1.2.2

Database specific

{
    "last_known_affected_version_range": "<= 1.2.2"
}