CVE-2020-5410
Directory Traversal with spring-cloud-config-server
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- January 03, 2020
- Published Date
- June 02, 2020
- Last Updated
- February 07, 2025
- Vendor
- Spring by VMware
- Product
- Spring Cloud Config
- Description
- Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.
CVSS Scores
CVSS v3.1
7.5 - HIGH
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
SSVC Information
- Exploitation
- active
- Automatable
- Yes
- Technical Impact
- partial
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2022-03-25 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-5410.yaml | 2025-04-26 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
osamahamad/CVE-2020-5410-POC
Type: github • Created: 2020-06-16 20:15:58 UTC • Stars: 31
CVE-2020-5410 Spring Cloud Config directory traversal vulnerability