logo

CVE-2020-5410 org.springframework.cloud:spring-cloud-config-server

Package

Manager: maven
Name: org.springframework.cloud:spring-cloud-config-server
Vulnerable Version: >=2.1.0 <2.1.9 || >=2.2.0 <2.2.3

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.94346 pctl0.99953

Details

Directory traversal attack in Spring Cloud Config Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.

Metadata

Created: 2020-06-05T16:13:20Z
Modified: 2022-09-21T19:31:46Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/06/GHSA-32xf-jwmv-9hf3/GHSA-32xf-jwmv-9hf3.json
CWE IDs: ["CWE-22", "CWE-23"]
Alternative ID: GHSA-32xf-jwmv-9hf3
Finding: F063
Auto approve: 1