First published: Thu Mar 05 2020(Updated: )
Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.
Credit: security@pivotal.io
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Tanzu Spring Cloud Configuration Server | >=2.1.0<2.1.7 | |
VMware Tanzu Spring Cloud Configuration Server | >=2.2.0<2.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5405 is classified as a High severity vulnerability due to the potential for unauthorized access to sensitive configuration files.
To fix CVE-2020-5405, upgrade to Spring Cloud Config versions 2.2.2 or 2.1.7 or later.
CVE-2020-5405 affects VMware Tanzu Spring Cloud Config versions prior to 2.2.2 and 2.1.7.
An attacker can exploit CVE-2020-5405 to serve arbitrary configuration files, potentially leading to data leaks.
Yes, a patch is available in the specified versions of Spring Cloud Config, which resolves the vulnerability.