Description
Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.
Remediation
References
https://tanzu.vmware.com/security/cve-2020-5410
Related Vulnerabilities
CVE-2020-17531 Vulnerability in maven package org.apache.tapestry:tapestry-core
CVE-2018-3774 Vulnerability in maven package org.webjars.npm:url-parse
CVE-2020-4077 Vulnerability in maven package org.webjars.npm:electron
CVE-2023-46131 Vulnerability in maven package org.grails:grails-encoder
CVE-2017-2648 Vulnerability in maven package org.jenkins-ci.plugins:ssh-slaves