Directory traversal attack in Spring Cloud Config
        
  High severity
        
          GitHub Reviewed
      
        Published
          Jun 5, 2020 
          to the GitHub Advisory Database
          •
          Updated Oct 22, 2025 
      
  
Package
Affected versions
>= 2.1.0, < 2.1.9
      >= 2.2.0, < 2.2.3
  Patched versions
2.1.9
      2.2.3
  Description
        Published by the National Vulnerability Database
      Jun 2, 2020 
    
  
        Reviewed
      Jun 4, 2020 
    
  
        Published to the GitHub Advisory Database
      Jun 5, 2020 
    
  
        Last updated
      Oct 22, 2025 
    
  
Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.
References