.. / CVE-2019-3799

Exploit for Spring Cloud Config Server - Local File Inclusion (CVE-2019-3799)

Description:

Spring Cloud Config Server versions 2.1.x prior to 2.1.2, 2.0.x prior to 2.0.4, 1.4.x prior to 1.4.6, and older unsupported versions are vulnerable to local file inclusion because they allow applications to serve arbitrary configuration files. An attacker can send a request using a specially crafted URL that can lead to a directory traversal attack.

Nuclei Template

View the template here CVE-2019-3799.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2019/CVE-2019-3799.yaml
Copy

References:

https://github.com/0xT11/CVE-POC
https://github.com/mpgn/CVE-2019-3799
https://www.oracle.com/security-alerts/cpuapr2022.html
https://pivotal.io/security/cve-2019-3799
https://nvd.nist.gov/vuln/detail/CVE-2019-3799