{"id":"CVE-2020-5405","details":"Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.","aliases":["GHSA-g86w-v5vg-9gxf"],"modified":"2026-04-12T00:01:49.195262Z","published":"2020-03-05T19:15:11.700Z","references":[{"type":"ADVISORY","url":"https://pivotal.io/security/cve-2020-5405"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/spring-cloud/spring-cloud-config","events":[{"introduced":"e62e06c39a7c20af1202a6600e91fc6b50d6a181"},{"fixed":"aef63b9d39b169cd6cfa9d4d13029a40e9ad0f72"},{"introduced":"b5bd468c3339a28186b6bd0ee9dd36d2241e674a"},{"fixed":"bbb5f19ce219e9dfef01a45f3e576f161dfb2685"}],"database_specific":{"cpe":"cpe:2.3:a:vmware:spring_cloud_config:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"2.1.0"},{"fixed":"2.1.7"},{"introduced":"2.2.0"},{"fixed":"2.2.2"}],"source":"CPE_FIELD"}}],"versions":["v2.1.0.RELEASE","v2.1.1.RELEASE","v2.1.2.RELEASE","v2.1.3.RELEASE","v2.1.4.RELEASE","v2.1.5.RELEASE","v2.1.6.RELEASE","v2.2.0.RELEASE","v2.2.1.RELEASE"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-5405.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}]}