.. / CVE-2020-5410

Exploit for Spring Cloud Config Server - Local File Inclusion (CVE-2020-5410)

Description:

Spring Cloud Config Server versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user or attacker can send a request using a specially crafted URL that can lead to a local file inclusion attack.

Nuclei Template

View the template here CVE-2020-5410.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2020/CVE-2020-5410.yaml
Copy

References:

https://github.com/alphaSeclab/sec-daily-2020
https://nvd.nist.gov/vuln/detail/CVE-2020-5410
https://github.com/Live-Hack-CVE/CVE-2020-5410
https://tanzu.vmware.com/security/cve-2020-5410
https://github.com/tdtc7/qps