Directory traversal attack in Spring Cloud Config
High severity
GitHub Reviewed
Published
Jun 5, 2020
to the GitHub Advisory Database
•
Updated Jan 29, 2023
Package
Affected versions
>= 2.1.0, < 2.1.9
>= 2.2.0, < 2.2.3
Patched versions
2.1.9
2.2.3
Description
Published by the National Vulnerability Database
Jun 2, 2020
Reviewed
Jun 4, 2020
Published to the GitHub Advisory Database
Jun 5, 2020
Last updated
Jan 29, 2023
Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.
References