Security for everyone

CVE-2020-5405 Scanner

Detects 'Directory Traversal' vulnerability in Spring Cloud Config affects v. from 2.2 before 2.2.2 and from 2.1 before 2.1.7.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

30 sec

Scan only one


Parent Category

CVE-2020-5405 Scanner Detail

Spring Cloud Config is a popular configuration management tool used by developers to centralize and manage the configuration of distributed systems. It provides a software-defined approach to managing application configurations in a safe and secure manner, making it easier for developers to dynamically configure their applications. The tool is highly configurable, and it can connect to various sources of configuration data, including property files, YAML files, and environment variables. With its ability to manage configurations across various platforms and environments, Spring Cloud Config plays a crucial role in ensuring the stability and performance of distributed systems.

However, a new vulnerability, CVE-2020-5405, which has been detected in this product, has put its functionality and usability into question. This vulnerability allows attackers to exploit the Spring Cloud Config server module and send a request through a specially crafted URL, which leads to a directory traversal attack. This vulnerability is particularly severe as it can allow attackers to bypass authentication and access arbitrary configuration files. Once an attacker gains access to these files, they can modify them to their advantage, potentially leading to a range of security risks.

The exploitation of CVE-2020-5405 can have devastating consequences for organizations that use Spring Cloud Config to manage their critical applications. A successful attack could result in the theft of confidential data, the compromise of sensitive systems, and the disruption of critical business operations. The attack could also affect the integrity of applications, leading to crashes, data loss, or other issues. While the vulnerability requires attackers to have access to the target system, it is still a significant threat that organizations should take seriously.

In conclusion, with the increasing number of vulnerabilities being detected in widely-used products such as Spring Cloud Config, it is essential for organizations to keep track of the latest security threats. is a powerful platform that allows organizations to easily and quickly learn about the vulnerabilities in their digital assets. With pro features such as real-time monitoring and automatic updates, it is an excellent tool for staying ahead of emerging threats and ensuring the security and stability of their digital infrastructure.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture