← Zuruck zu CVEs
CVE-2020-5410
HIGHCISA KEV7.5
Beschreibung
Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.
CVE Details
CVSS v3.1 Bewertung7.5
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht6/2/2020
Zuletzt geandert11/3/2025
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerVMware Tanzu
ProduktSpring Cloud Configuration (Config) Server
SchwachstellennameVMware Tanzu Spring Cloud Config Directory Traversal Vulnerability
KEV Aufnahmedatum2022-03-25
Behebungsfrist2022-04-15
Ransomware-NutzungUnknown
Betroffene Produkte
vmware:spring_cloud_config
Schwachen (CWE)
CWE-23CWE-22
Referenzen
https://tanzu.vmware.com/security/cve-2020-5410(security@pivotal.io)
https://tanzu.vmware.com/security/cve-2020-5410(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-5410(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.