CVE-2020-5410

Directory Traversal with spring-cloud-config-server

Basic Information

CVE State
PUBLISHED
Reserved Date
January 03, 2020
Published Date
June 02, 2020
Last Updated
February 07, 2025
Vendor
Spring by VMware
Product
Spring Cloud Config
Description
Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.

CVSS Scores

CVSS v3.1

7.5 - HIGH

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

SSVC Information

Exploitation
active
Automatable
Yes
Technical Impact
partial

Exploit Status

Exploited in the Wild
Yes (added 2022-03-25 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2020-06-16 20:15:58 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2022-03-25 00:00:00 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

osamahamad/CVE-2020-5410-POC

Type: github • Created: 2020-06-16 20:15:58 UTC • Stars: 31

CVE-2020-5410 Spring Cloud Config directory traversal vulnerability