VMware offers training and certification to turbo-charge your progress.Learn more
Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.
Users of affected versions should apply the following mitigation: 2.2.x users should upgrade to 2.2.2, 2.1.x users should upgrade to 2.1.7. Older versions should upgrade to a supported branch. There are no other mitigation steps necessary. Note that spring-cloud-config-server should only be available on internal networks to clients that require it and it should be secured with Spring Security, this limits exposure to this vulnerability to those with internal network access and those users with proper authentication. Releases that have fixed this issue include:
This issue was identified and responsibly reported by Yiming Xiang ([email protected] at NSFOCUS Security Team).
The VMware Security Response team provides a single point of contact for the reporting of security vulnerabilities in VMware Tanzu products and coordinates the process of investigating any reported vulnerabilities.
To report a security vulnerability in a VMware service or product please refer to the VMware Security Response Policy.