Spring Cloud Config allows applications to serve arbitrary text and binary files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack. Spring Cloud Config 3.1.x: affected from 3.1.0 through 3.1.13 (inclusive); upgrade to 3.1.14 or greater (Enterprise Support Only). Spring Cloud Config 4.1.x: affected from 4.1.0 through 4.1.9 (inclusive); upgrade to 4.1.10 or greater (Enterprise Support Only). Spring Cloud Config 4.2.x: affected from 4.2.0 through 4.2.6 (inclusive); upgrade to 4.2.7 or greater (Enterprise Support Only). Spring Cloud Config 4.3.x: affected from 4.3.0 through 4.3.2 (inclusive); upgrade to 4.3.3 or greater. Spring Cloud Config 5.0.x: affected from 5.0.0 through 5.0.2 (inclusive); upgrade to 5.0.3 or greater.
| Vendor | Product | Versions |
|---|---|---|
| spring | spring cloud config | maven/org.springframework.cloud:spring-cloud-config-server: >= 3.1.0, <= 3.1.13, maven/org.springframework.cloud:spring-cloud-config-server: >= 4.1.0, <= 4.1.9, maven/org.springframework.cloud:spring-cloud-config-server: >= 4.2.0, <= 4.2.6, maven/org.springframework.cloud:spring-cloud-config-server: >= 4.3.0, <= 4.3.2, maven/org.springframework.cloud:spring-cloud-config-server: >= 5.0.0, <= 5.0.2 |
Downstream vendors/products affected by this vulnerability
| Vendor | Product | Source | Confidence |
|---|---|---|---|
| maven | org.springframework.cloud:spring-cloud-config-server | GHSA | 85% |
| vmware tanzu | spring cloud | cert_advisory | 90% |
Marked exploitAvailable and activelyExploited as true based on the new article.
Initial creation