{"uuid": "66426180-fa89-4085-97f1-9c126cfb2a1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-5410", "type": "seen", "source": "https://t.me/arpsyndicate/963", "content": "#ExploitObserverAlert\n\nCVE-2020-5410\n\nDESCRIPTION: Exploit Observer has 55 entries related to CVE-2020-5410. Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.\n\nFIRST-EPSS: 0.967940000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-12-03T15:15:23.000000Z"}