CVE-2025-3047

When running the AWS Serverless Application Model Command Line Interface (SAM CLI) build process with Docker and symlinks are included in the build files, the container environment allows a user to access privileged files on the host by leveraging the elevated permissions granted to the tool. A user could leverage the elevated permissions to access restricted files via symlinks and copy them to a more permissive location on the container. Users should upgrade to v1.133.0 or newer and ensure any forked or derivative code is patched to incorporate the new fixes.
Configurations

No configuration.

History

31 Mar 2025, 17:15

Type Values Removed Values Added
References
  • () https://github.com/aws/aws-sam-cli/security/advisories/GHSA-px37-jpqx-97q9 -

31 Mar 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-31 16:15

Updated : 2025-04-01 20:26


NVD link : CVE-2025-3047

Mitre link : CVE-2025-3047

CVE.ORG link : CVE-2025-3047


JSON object : View

Products Affected

No product.

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-497

Exposure of Sensitive System Information to an Unauthorized Control Sphere