Affordable, manageable, understandable solution for cyber security. Get early access for Product X !
Details
Stay Up To Date
Need Membership

No

API Support

Yes

Estimate Time (Second)

30

Spring Cloud Config Server Directory Traversal Vulnerability (CVE-2020-5410) Scanner Detail

If you are using Spring Cloud Config Server, it is better to check your system if any vulnerability exists.

Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.

Some Advice for Common Problems

Update your Spring Cloud Config Server, to the latest version to eliminate this vulnerability.

Need a Full Assesment?

Get help from professional hackers. Learn about our penetration test service now!

Request Pentest Service