The base directory (`spring.cloud.config.server.git.basedir`) used by the Spring Cloud Config Server to clone Git repositories to is susceptible to time-of-check-time-of-use (TOCTOU) attacks. Spring Cloud Config 3.1.x: affected from 3.1.0 through 3.1.13 (inclusive); upgrade to 3.1.14 or greater (Enterprise Support Only). Spring Cloud Config 4.1.x: affected from 4.1.0 through 4.1.9 (inclusive); upgrade to 4.1.10 or greater (Enterprise Support Only). Spring Cloud Config 4.2.x: affected from 4.2.0 through 4.2.6 (inclusive); upgrade to 4.2.7 or greater (Enterprise Support Only). Spring Cloud Config 4.3.x: affected from 4.3.0 through 4.3.2 (inclusive); upgrade to 4.3.3 or greater. Spring Cloud Config 5.0.x: affected from 5.0.0 through 5.0.2 (inclusive); upgrade to 5.0.3 or greater.
| Vendor | Product | Versions |
|---|---|---|
| spring | spring cloud config | maven/org.springframework.cloud:spring-cloud-config-server: >= 3.1.0, <= 3.1.13, maven/org.springframework.cloud:spring-cloud-config-server: >= 4.1.0, <= 4.1.9, maven/org.springframework.cloud:spring-cloud-config-server: >= 4.2.0, <= 4.2.6, maven/org.springframework.cloud:spring-cloud-config-server: >= 4.3.0, <= 4.3.2, maven/org.springframework.cloud:spring-cloud-config-server: >= 5.0.0, <= 5.0.2 |
Downstream vendors/products affected by this vulnerability
| Vendor | Product | Source | Confidence |
|---|---|---|---|
| maven | org.springframework.cloud:spring-cloud-config-server | GHSA | 85% |
| vmware tanzu | spring cloud | cert_advisory | 90% |
Marked exploitAvailable and activelyExploited as true, and added new tags related to the security advisory.
Initial creation