5
CVSSv2

CVE-2020-5410

Published: 02/06/2020 Updated: 20/09/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 447
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Spring Cloud Config, versions 2.2.x before 2.2.3, versions 2.1.x before 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vmware spring cloud config

Github Repositories

CVE-2020-5410 Spring Cloud Config directory traversal vulnerability

CVE-2020-5410 Spring Cloud Config directory traversal vulnerability Vulnerability description Spring Cloud Config, version 22x before 223, version 21x before 219, and older unsupported versions allow applications to provide arbitrary configuration files through the spring-cloud-config-server module Malicious users or attackers can use specially crafted URLs to send req

CVE-2020-5410

CVE-2020-5410

CVE-2020-5405 spring-cloud-config路径穿越导致的信息泄露 1、/etc/hosts无法读取;/etc/hostsallow可以读取;/etc/ca-certificatesconf还可通过拼接读取。 2、路径穿越可以被利用的条件是: 在配置文件applicationproperties/applicationyml中配置springprofilesactive的值为本地文件系统native(一般是git的url?); 3、

bash_profile :: Automated reconnaissance wrapper - collecting juicy data & vulnerable testing # Dependencies --> go binaries :: githubcom/missme3f/bin sudomy(bash), comb(go), cf-check(go), CORS-Scanner(go), dalfox(go), dnsprobe(go), ffuf(go), gowitness(go), gron(go), gau(go), gf(go), gospider(go), httpx(go), naabu(go), nuclei(go), meg(go), subjack(go),

CVE漏洞复现

Vulnerability Spring Cloud Config 目录穿越漏洞(CVE-2020-5410) PHPMailer-CVE-2016-10033