Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2020-5405

Severity
6.5MEDIUM
EPSS
88.0%
top 0.52%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMar 5
Latest updateJun 15

Description

Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

🔴Vulnerability Details

3
GHSA
Directory traversal attack in Spring Cloud Config2020-06-05
OSV
Directory traversal attack in Spring Cloud Config2020-06-05
CVEList
Directory Traversal with spring-cloud-config-server2020-03-05

💥Exploits & PoCs

1
Nuclei
Spring Cloud Config - Local File Inclusion

🔍Detection Rules

1
Suricata
ET EXPLOIT VMware Spring Cloud Directory Traversal (CVE-2020-5405)2020-06-15

📋Vendor Advisories

1
Red Hat
spring-cloud-config-server: Directory Traversal with spring-cloud-config-server2020-02-26

💬Community

1
Bugzilla
CVE-2020-5405 spring-cloud-config-server: Directory Traversal with spring-cloud-config-server2020-04-24
CVE-2020-5405 (MEDIUM CVSS 6.5) | Spring Cloud Config | cvebase.io