First published: Wed Apr 17 2019(Updated: )
Spring Cloud Config, versions 2.1.x prior to 2.1.2, versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Tanzu Spring Cloud Configuration Server | >=1.4.0<1.4.6 | |
VMware Tanzu Spring Cloud Configuration Server | >=2.0.0<2.0.4 | |
Oracle Communications Cloud Native Core Policy | =1.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3799 is classified as a high severity vulnerability due to its impact on application security.
To fix CVE-2019-3799, upgrade Spring Cloud Config to version 2.1.2 or higher, 2.0.4 or higher, or 1.4.6 or higher.
CVE-2019-3799 affects Spring Cloud Config versions 2.1.x prior to 2.1.2, 2.0.x prior to 2.0.4, and 1.4.x prior to 1.4.6.
The impact of CVE-2019-3799 is that it allows applications to serve arbitrary configuration files, potentially exposing sensitive data.
There are no official workarounds for CVE-2019-3799; upgrading to a patched version is necessary to mitigate the vulnerability.