CVE-2019-3799:
Path Traversal in Spring Cloud Config
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99191%
CWE
Published
5/23/2019
Updated
2/1/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.springframework.cloud:spring-cloud-config-server | maven | < 1.4.6 | 1.4.6 |
org.springframework.cloud:spring-cloud-config-server | maven | >= 2.0.0, < 2.0.4 | 2.0.4 |
org.springframework.cloud:spring-cloud-config-server | maven | >= 2.1.0, < 2.1.2 | 2.1.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability occurs in the path handling logic of Spring Cloud Config Server's resource serving endpoint. The GenericResourceRepository.findOne method was processing user-supplied paths without adequate validation, allowing directory traversal via encoded path segments. The ResourceController.retrieve method serves as the entry point that passes the unsanitized path parameter to the vulnerable code. The patch adds multiple validation layers (isInvalidPath, processPath, cleanDuplicateSlashes) demonstrating where the original vulnerability existed.