Exploited
7.5
CWE
22 23
Advisory Published
CVE Published
Updated

CVE-2020-5410: VMware Tanzu Spring Cloud Config Directory Traversal Vulnerability

First published: Fri May 15 2020(Updated: )

A flaw was found in spring-cloud-config in versions prior to 2.1.9 and 2.2.3. Applications are allowed to serve arbitrary configuration files through the spring-cloud-config-server module allowing an attacker to send a request using a specially crafted URL to create a directory traversal attack. The highest threat from this vulnerability is to data confidentiality.

Credit: security@pivotal.io security@pivotal.io

Affected SoftwareAffected VersionHow to fix
>=2.1.0<2.1.9
>=2.2.0<2.2.3
redhat/spring-cloud-config<2.2.3
2.2.3
redhat/spring-cloud-config<2.1.9
2.1.9
VMware Tanzu Spring Cloud Configuration (Config) Server
Vmware Spring Cloud Config>=2.1.0<2.1.9
Vmware Spring Cloud Config>=2.2.0<2.2.3

Remedy

Users of vulnerable versions or older, unsupported versions of spring-cloud-config-server should upgrade to a patched version. Spring-cloud-config-server should only be accessible on internal networks.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2020-5410?

    CVE-2020-5410 is a directory traversal vulnerability found in VMware Tanzu Spring Cloud Config.

  • How does CVE-2020-5410 affect VMware Tanzu Spring Cloud Config?

    CVE-2020-5410 allows an attacker to create a directory traversal attack by sending a specially crafted URL request to the spring-cloud-config-server module, allowing them to serve arbitrary configuration files.

  • What is the severity of CVE-2020-5410?

    CVE-2020-5410 has a severity value of 7.5 (High).

  • Which versions of VMware Tanzu Spring Cloud Config are affected by CVE-2020-5410?

    Versions prior to 2.1.9 and 2.2.3 of VMware Tanzu Spring Cloud Config are affected by CVE-2020-5410.

  • How can I fix CVE-2020-5410?

    To fix CVE-2020-5410, update your VMware Tanzu Spring Cloud Config to version 2.1.9 or 2.2.3.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203