CVE-2020-5410

HIGH KEV NUCLEI

Spring Cloud Config <2.2.3 & <2.1.9 - Path Traversal

Title source: llm

Description

Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.

Exploits (5)

nomisec WORKING POC 31 stars
by osamahamad · poc
https://github.com/osamahamad/CVE-2020-5410-POC
nomisec WRITEUP
by shoucheng3 · poc
https://github.com/shoucheng3/spring-cloud__spring-cloud-config_CVE-2020-5410_2-1-8-RELEASE
nomisec SUSPICIOUS
by dead5nd · poc
https://github.com/dead5nd/config-demo
vulncheck_xdb WRITEUP
infoleak
https://github.com/bloodbile/LobeChat-MIX
metasploit WORKING POC
by Fei Lu, [email protected], Dhiraj Mishra · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/springcloud_directory_traversal.rb

Nuclei Templates (1)

Spring Cloud Config Server - Local File Inclusion
HIGHby mavericknerd

Scores

CVSS v3 7.5
EPSS 0.9436
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

CISA KEV 2022-03-25
VulnCheck KEV 2022-01-12
InTheWild.io 2021-10-11
ENISA EUVD EUVD-2020-0451
CWE
CWE-22 CWE-23
Status published
Products (2)
org.springframework.cloud/spring-cloud-config-server 2.1.0 - 2.1.9Maven
vmware/spring_cloud_config 2.1.0 - 2.1.9
Published Jun 02, 2020
KEV Added Mar 25, 2022
Tracked Since Feb 18, 2026