Description
Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.
Remediation
Users of vulnerable versions or older, unsupported versions of spring-cloud-config-server should upgrade to a patched version. Spring-cloud-config-server should only be accessible on internal networks.
References
Related Vulnerabilities
Joomla! Core 3.x.x Directory Traversal (3.0.0 - 3.9.24)
WordPress Plugin Import and export users and customers Directory Traversal (1.14.2)
WordPress Plugin Mail Masta Local File Inclusion (1.0)
Oracle JavaServer Faces multiple vulnerabilities
WordPress Plugin WP Fastest Cache Local File Inclusion (0.8.5.9)