Directory traversal attack in Spring Cloud Config
High severity
GitHub Reviewed
Published
Jun 5, 2020
to the GitHub Advisory Database
•
Updated Oct 22, 2025
Package
Affected versions
>= 2.1.0, < 2.1.9
>= 2.2.0, < 2.2.3
Patched versions
2.1.9
2.2.3
Description
Published by the National Vulnerability Database
Jun 2, 2020
Reviewed
Jun 4, 2020
Published to the GitHub Advisory Database
Jun 5, 2020
Last updated
Oct 22, 2025
Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.
References