Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3047: CWE-61: UNIX Symbolic Link (Symlink) Following in AWS AWS Serverless Application Model Command Line Interface

0
Medium
VulnerabilityCVE-2025-3047cvecve-2025-3047cwe-61
Published: Mon Mar 31 2025 (03/31/2025, 15:21:11 UTC)
Source: CVE Database V5
Vendor/Project: AWS
Product: AWS Serverless Application Model Command Line Interface

Description

When running the AWS Serverless Application Model Command Line Interface (SAM CLI) build process with Docker and symlinks are included in the build files, the container environment allows a user to access privileged files on the host by leveraging the elevated permissions granted to the tool. A user could leverage the elevated permissions to access restricted files via symlinks and copy them to a more permissive location on the container. Users should upgrade to v1.133.0 or newer and ensure any forked or derivative code is patched to incorporate the new fixes.

AI-Powered Analysis

AILast updated: 10/14/2025, 18:51:24 UTC

Technical Analysis

CVE-2025-3047 is a path traversal vulnerability (CWE-22) found in the AWS Serverless Application Model Command Line Interface (SAM CLI) specifically affecting version 1.98.0. The vulnerability manifests during the build process when Docker containers are used and the build files include symbolic links. The SAM CLI runs the build inside a container with elevated permissions, but it fails to properly limit pathname traversal through these symlinks. This flaw allows an attacker who can initiate a build process to leverage the container’s elevated permissions to access and copy privileged files from the host system into the container environment. The issue is exacerbated by the fact that the container environment is granted more permissive access than intended, effectively breaking the isolation boundary. The vulnerability does not require prior authentication or privileges but does require user interaction to trigger the build. The CVSS 4.0 score is 6.9 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, but user interaction needed, and high impact on confidentiality. AWS has addressed this vulnerability in SAM CLI version 1.133.0 and later, and users are advised to upgrade and patch any forked or derivative codebases accordingly. No known exploits are currently reported in the wild.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized access to sensitive files on host systems running vulnerable SAM CLI versions, especially in development and CI/CD environments that use Docker-based builds. Confidentiality is primarily impacted, as attackers could extract privileged files, potentially including credentials, configuration files, or proprietary source code. This could lead to data breaches, intellectual property theft, or further lateral movement within the network. Integrity and availability impacts are minimal but cannot be fully ruled out if attackers manipulate build artifacts or disrupt build processes. Organizations relying heavily on AWS SAM CLI for serverless application development or deployment automation are at risk, particularly those with complex build pipelines involving Docker containers and symlinked files. The vulnerability could also undermine trust in container isolation, increasing the attack surface in cloud-native development environments.

Mitigation Recommendations

European organizations should immediately upgrade all instances of AWS SAM CLI to version 1.133.0 or newer to incorporate the official fix. Review and patch any forked or derivative versions of the SAM CLI to ensure the vulnerability is addressed. Audit build pipelines to identify and remove unnecessary symlinks in build files or restrict their usage. Implement strict container runtime security policies to limit container permissions and prevent containers from accessing host filesystems beyond what is necessary. Employ runtime monitoring and anomaly detection to identify unusual file access patterns during builds. Restrict who can trigger build processes and enforce least privilege principles for users interacting with SAM CLI. Regularly scan development environments for outdated or vulnerable tools and integrate vulnerability management into the DevSecOps lifecycle. Finally, consider isolating build environments on dedicated hosts or virtual machines to reduce potential impact.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
AMZN
Date Reserved
2025-03-31T13:32:50.477Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ee9812d8f994a66ec3232a

Added to database: 10/14/2025, 6:36:02 PM

Last enriched: 10/14/2025, 6:51:24 PM

Last updated: 10/16/2025, 2:41:36 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats