When running the AWS Serverless Application Model Command Line Interface (SAM CLI) build process with Docker and symlinks are included in the build files, the container environment allows a user to access privileged files on the host by leveraging the elevated permissions granted to the tool. A user could leverage the elevated permissions to access restricted files via symlinks and copy them to a more permissive location on the container.
Users should upgrade to v1.133.0 or newer and ensure any forked or derivative code is patched to incorporate the new fixes.
Metrics
Affected Vendors & Products
References
History
Mon, 31 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 31 Mar 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 31 Mar 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | When running the AWS Serverless Application Model Command Line Interface (SAM CLI) build process with Docker and symlinks are included in the build files, the container environment allows a user to access privileged files on the host by leveraging the elevated permissions granted to the tool. A user could leverage the elevated permissions to access restricted files via symlinks and copy them to a more permissive location on the container. Users should upgrade to v1.133.0 or newer and ensure any forked or derivative code is patched to incorporate the new fixes. | |
Title | Path Traversal in AWS SAM CLI allows file copy to build container | |
Weaknesses | CWE-22 CWE-497 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2025-03-31T18:50:10.414Z
Reserved: 2025-03-31T13:32:50.477Z
Link: CVE-2025-3047

Updated: 2025-03-31T16:19:58.059Z

Status : Awaiting Analysis
Published: 2025-03-31T16:15:27.683
Modified: 2025-04-01T20:26:22.890
Link: CVE-2025-3047

No data.