Vulnerabilites related to Spring - Spring Cloud Config
cve-2019-3799
Vulnerability from cvelistv5
Published
2019-05-06 15:21
Modified
2024-09-17 00:16
Severity ?
EPSS score ?
Summary
Spring Cloud Config, versions 2.1.x prior to 2.1.2, versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.
References
▼ | URL | Tags |
---|---|---|
https://www.oracle.com/security-alerts/cpuapr2022.html | x_refsource_MISC | |
https://pivotal.io/security/cve-2019-3799 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Spring | Spring Cloud Config |
Version: 2.0 < v2.0.4.RELEASE Version: 1.4 < v1.4.6.RELEASE Version: 2.1 < v2.1.2.RELEASE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:19:18.484Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pivotal.io/security/cve-2019-3799" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Spring Cloud Config", "vendor": "Spring", "versions": [ { "lessThan": "v2.0.4.RELEASE", "status": "affected", "version": "2.0", "versionType": "custom" }, { "lessThan": "v1.4.6.RELEASE", "status": "affected", "version": "1.4", "versionType": "custom" }, { "lessThan": "v2.1.2.RELEASE", "status": "affected", "version": "2.1", "versionType": "custom" } ] } ], "datePublic": "2019-04-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Spring Cloud Config, versions 2.1.x prior to 2.1.2, versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Path Traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T23:20:44", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pivotal.io/security/cve-2019-3799" } ], "source": { "discovery": "UNKNOWN" }, "title": "Directory Traversal with spring-cloud-config-server", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@dell.com", "DATE_PUBLIC": "2019-04-17T00:00:00.000Z", "ID": "CVE-2019-3799", "STATE": "PUBLIC", "TITLE": "Directory Traversal with spring-cloud-config-server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Spring Cloud Config", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_name": "2.0", "version_value": "v2.0.4.RELEASE" }, { "affected": "\u003c", "version_affected": "\u003c", "version_name": "1.4", "version_value": "v1.4.6.RELEASE" }, { "affected": "\u003c", "version_affected": "\u003c", "version_name": "2.1", "version_value": "v2.1.2.RELEASE" } ] } } ] }, "vendor_name": "Spring" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Spring Cloud Config, versions 2.1.x prior to 2.1.2, versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22: Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "https://pivotal.io/security/cve-2019-3799", "refsource": "CONFIRM", "url": "https://pivotal.io/security/cve-2019-3799" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2019-3799", "datePublished": "2019-05-06T15:21:37.135488Z", "dateReserved": "2019-01-03T00:00:00", "dateUpdated": "2024-09-17T00:16:21.820Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }