First published: Fri May 15 2020(Updated: )
A flaw was found in spring-cloud-config in versions prior to 2.1.9 and 2.2.3. Applications are allowed to serve arbitrary configuration files through the spring-cloud-config-server module allowing an attacker to send a request using a specially crafted URL to create a directory traversal attack. The highest threat from this vulnerability is to data confidentiality.
Credit: security@pivotal.io security@pivotal.io
Affected Software | Affected Version | How to fix |
---|---|---|
>=2.1.0<2.1.9 | ||
>=2.2.0<2.2.3 | ||
redhat/spring-cloud-config | <2.2.3 | 2.2.3 |
redhat/spring-cloud-config | <2.1.9 | 2.1.9 |
VMware Tanzu Spring Cloud Configuration (Config) Server | ||
Vmware Spring Cloud Config | >=2.1.0<2.1.9 | |
Vmware Spring Cloud Config | >=2.2.0<2.2.3 |
Users of vulnerable versions or older, unsupported versions of spring-cloud-config-server should upgrade to a patched version. Spring-cloud-config-server should only be accessible on internal networks.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5410 is a directory traversal vulnerability found in VMware Tanzu Spring Cloud Config.
CVE-2020-5410 allows an attacker to create a directory traversal attack by sending a specially crafted URL request to the spring-cloud-config-server module, allowing them to serve arbitrary configuration files.
CVE-2020-5410 has a severity value of 7.5 (High).
Versions prior to 2.1.9 and 2.2.3 of VMware Tanzu Spring Cloud Config are affected by CVE-2020-5410.
To fix CVE-2020-5410, update your VMware Tanzu Spring Cloud Config to version 2.1.9 or 2.2.3.