Vulnerability identifier: #VU18426
Vulnerability risk: Medium
CVSSv3.1: 6.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:F/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-22
Exploitation vector: Network
Exploit availability: Yes
Vulnerable software:
Spring Cloud Config
Server applications /
Application servers
Vendor: Pivotal
Description
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists because the spring-cloud-config-server module of the affected software allows applications to serve static resources from a file system. A remote attacker can send a specially crafted HTTP request and read, overwrite or delete arbitrary files on the system.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Spring Cloud Config: 1.0.0. - v2.1.1.
External links
http://github.com/mpgn/CVE-2019-3799
http://pivotal.io/security/cve-2019-3799
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.