mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-07 19:16:22 +00:00
4.1 KiB
4.1 KiB
CVE-2020-5410
Description
Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.
POC
Reference
No PoCs from references.
Github
- https://github.com/0ps/pocassistdb
- https://github.com/0xT11/CVE-POC
- https://github.com/20142995/pocsuite
- https://github.com/2lambda123/SBSCAN
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/CLincat/vulcat
- https://github.com/CnHack3r/Penetration_PoC
- https://github.com/Corgizz/SpringCloud
- https://github.com/DSO-Lab/pocscan
- https://github.com/EchoGin404/-
- https://github.com/EchoGin404/gongkaishouji
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/HackJava/HackSpring
- https://github.com/HackJava/Spring
- https://github.com/HimmelAward/Goby_POC
- https://github.com/Live-Hack-CVE/CVE-2020-5410
- https://github.com/Loneyers/SpringBootScan
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/NetW0rK1le3r/awesome-hacking-lists
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Tyro-Shan/gongkaishouji
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
- https://github.com/Z0fhack/Goby_POC
- https://github.com/ZTK-009/Penetration_PoC
- https://github.com/alphaSeclab/sec-daily-2020
- https://github.com/amcai/myscan
- https://github.com/apachecn-archive/Middleware-Vulnerability-detection
- https://github.com/ax1sX/SpringSecurity
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/dead5nd/config-demo
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/dudek-marcin/Poc-Exp
- https://github.com/enomothem/PenTestNote
- https://github.com/hasee2018/Penetration_Testing_POC
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hktalent/bug-bounty
- https://github.com/huike007/penetration_poc
- https://github.com/huike007/poc
- https://github.com/huimzjty/vulwiki
- https://github.com/ilmila/J2EEScan
- https://github.com/jweny/pocassistdb
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
- https://github.com/merlinepedra/nuclei-templates
- https://github.com/merlinepedra25/nuclei-templates
- https://github.com/missme3f/resource
- https://github.com/mugisyahid/ki-vuln-cve-2020-5410
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/osamahamad/CVE-2020-5410-POC
- https://github.com/password520/Penetration_PoC
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/readloud/Awesome-Stars
- https://github.com/ronoski/j2ee-rscan
- https://github.com/shadowsock5/spring-cloud-config-starter
- https://github.com/sobinge/nuclei-templates
- https://github.com/soosmile/POC
- https://github.com/sule01u/SBSCAN
- https://github.com/tdtc7/qps
- https://github.com/thelostworldFree/SpringCloud-Config-CVE-2020-5410
- https://github.com/threedr3am/learnjavabug
- https://github.com/whale-baby/Vulnerability
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xbl2022/awesome-hacking-lists
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-
- https://github.com/yedada-wei/gongkaishouji
- https://github.com/zhibx/fscan-Intranet