ID |
CVE-2025-3047
|
Sažetak |
When running the AWS Serverless Application Model Command Line Interface (SAM CLI) build process with Docker and symlinks are included in the build files, the container environment allows a user to access privileged files on the host by leveraging the elevated permissions granted to the tool. A user could leverage the elevated permissions to access restricted files via symlinks and copy them to a more permissive location on the container.
Users should upgrade to v1.133.0 or newer and ensure any forked or derivative code is patched to incorporate the new fixes. |
Reference |
|
CVSS |
Base: | 6.5 |
Impact: | 3.6 |
Exploitability: | 2.8 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
LOW |
NONE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
HIGH |
NONE |
NONE |
|
CVSS vektor |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N |
Zadnje važnije ažuriranje |
01-04-2025 - 20:26 |
Objavljeno |
31-03-2025 - 16:15 |