CVE-2017-8039 (GCVE-0-2017-8039)
Vulnerability from cvelistv5 – Published: 2017-11-27 10:00 – Updated: 2024-08-05 16:19
VLAI?
Summary
An issue was discovered in Pivotal Spring Web Flow through 2.4.5. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to 'false') can be vulnerable to malicious EL expressions in view states that process form submissions but do not have a sub-element to declare explicit data binding property mappings. NOTE: this issue exists because of an incomplete fix for CVE-2017-4971.
Severity ?
No CVSS data available.
CWE
- Data Binding Expression Vulnerability
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Spring Web Flow Spring Web Flow 2.4.0 to 2.4.5 and Older unsupported versions are also affected |
Affected:
Spring Web Flow Spring Web Flow 2.4.0 to 2.4.5 and Older unsupported versions are also affected
|
Date Public ?
2017-11-27 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T16:19:29.618Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://pivotal.io/security/cve-2017-8039"
},
{
"name": "100849",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/100849"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Spring Web Flow Spring Web Flow 2.4.0 to 2.4.5 and Older unsupported versions are also affected",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Spring Web Flow Spring Web Flow 2.4.0 to 2.4.5 and Older unsupported versions are also affected"
}
]
}
],
"datePublic": "2017-11-27T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Pivotal Spring Web Flow through 2.4.5. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to \u0027false\u0027) can be vulnerable to malicious EL expressions in view states that process form submissions but do not have a sub-element to declare explicit data binding property mappings. NOTE: this issue exists because of an incomplete fix for CVE-2017-4971."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Data Binding Expression Vulnerability",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-11-27T10:57:02.000Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://pivotal.io/security/cve-2017-8039"
},
{
"name": "100849",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/100849"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security_alert@emc.com",
"ID": "CVE-2017-8039",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Spring Web Flow Spring Web Flow 2.4.0 to 2.4.5 and Older unsupported versions are also affected",
"version": {
"version_data": [
{
"version_value": "Spring Web Flow Spring Web Flow 2.4.0 to 2.4.5 and Older unsupported versions are also affected"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Pivotal Spring Web Flow through 2.4.5. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to \u0027false\u0027) can be vulnerable to malicious EL expressions in view states that process form submissions but do not have a sub-element to declare explicit data binding property mappings. NOTE: this issue exists because of an incomplete fix for CVE-2017-4971."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Data Binding Expression Vulnerability"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://pivotal.io/security/cve-2017-8039",
"refsource": "CONFIRM",
"url": "https://pivotal.io/security/cve-2017-8039"
},
{
"name": "100849",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100849"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2017-8039",
"datePublished": "2017-11-27T10:00:00.000Z",
"dateReserved": "2017-04-21T00:00:00.000Z",
"dateUpdated": "2024-08-05T16:19:29.618Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pivotal:spring_web_flow:2.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59073ACA-F7C5-4C50-85E7-80073ED4358A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pivotal:spring_web_flow:2.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C2CF5C8-DA12-4778-9072-27F27BACAF8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pivotal:spring_web_flow:2.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32B5074F-2E48-4A4E-AA19-D8883775A818\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pivotal:spring_web_flow:2.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB71B411-A6F7-4EE3-BE6C-91DFF15DA656\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pivotal:spring_web_flow:2.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E46305F3-4B00-491E-9066-5750A375CA4A\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An issue was discovered in Pivotal Spring Web Flow through 2.4.5. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to \u0027false\u0027) can be vulnerable to malicious EL expressions in view states that process form submissions but do not have a sub-element to declare explicit data binding property mappings. NOTE: this issue exists because of an incomplete fix for CVE-2017-4971.\"}, {\"lang\": \"es\", \"value\": \"Se ha descubierto un problema en Pivotal Spring Web Flow hasta la versi\\u00f3n 2.4.5. Las aplicaciones que no cambian el valor de la propiedad MvcViewFactoryCreator useSpringBinding, que est\\u00e1 deshabilitada por defecto (esto es, marcada como \\\"false\\\"), pueden ser vulnerables a expresiones EL maliciosas en estados de vista que procesan env\\u00edos de formulario pero que no tienen un subelemento para declarar asignaciones expl\\u00edcitas de propiedades enlazadas con datos. NOTA: este problema existe debido a una soluci\\u00f3n incompleta para CVE-2017-4971.\"}]",
"id": "CVE-2017-8039",
"lastModified": "2024-11-21T03:33:12.107",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N\", \"baseScore\": 5.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2017-11-27T10:29:00.847",
"references": "[{\"url\": \"http://www.securityfocus.com/bid/100849\", \"source\": \"security_alert@emc.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://pivotal.io/security/cve-2017-8039\", \"source\": \"security_alert@emc.com\", \"tags\": [\"Issue Tracking\", \"Mitigation\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/100849\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://pivotal.io/security/cve-2017-8039\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Mitigation\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "security_alert@emc.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-1188\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-8039\",\"sourceIdentifier\":\"security_alert@emc.com\",\"published\":\"2017-11-27T10:29:00.847\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in Pivotal Spring Web Flow through 2.4.5. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to \u0027false\u0027) can be vulnerable to malicious EL expressions in view states that process form submissions but do not have a sub-element to declare explicit data binding property mappings. NOTE: this issue exists because of an incomplete fix for CVE-2017-4971.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema en Pivotal Spring Web Flow hasta la versi\u00f3n 2.4.5. Las aplicaciones que no cambian el valor de la propiedad MvcViewFactoryCreator useSpringBinding, que est\u00e1 deshabilitada por defecto (esto es, marcada como \\\"false\\\"), pueden ser vulnerables a expresiones EL maliciosas en estados de vista que procesan env\u00edos de formulario pero que no tienen un subelemento para declarar asignaciones expl\u00edcitas de propiedades enlazadas con datos. NOTA: este problema existe debido a una soluci\u00f3n incompleta para CVE-2017-4971.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1188\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pivotal:spring_web_flow:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59073ACA-F7C5-4C50-85E7-80073ED4358A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pivotal:spring_web_flow:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C2CF5C8-DA12-4778-9072-27F27BACAF8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pivotal:spring_web_flow:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32B5074F-2E48-4A4E-AA19-D8883775A818\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pivotal:spring_web_flow:2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB71B411-A6F7-4EE3-BE6C-91DFF15DA656\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pivotal:spring_web_flow:2.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E46305F3-4B00-491E-9066-5750A375CA4A\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/100849\",\"source\":\"security_alert@emc.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://pivotal.io/security/cve-2017-8039\",\"source\":\"security_alert@emc.com\",\"tags\":[\"Issue Tracking\",\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/100849\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://pivotal.io/security/cve-2017-8039\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mitigation\",\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…