CVE-2017-4971 (GCVE-0-2017-4971)

Vulnerability from cvelistv5 – Published: 2017-06-13 06:00 – Updated: 2024-08-05 14:47
VLAI?
Summary
An issue was discovered in Pivotal Spring Web Flow through 2.4.4. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to 'false') can be vulnerable to malicious EL expressions in view states that process form submissions but do not have a sub-element to declare explicit data binding property mappings.
Severity ?
No CVSS data available.
CWE
  • Data Binding Expression Vulnerability in Spring Web Flow
Assigner
References
Impacted products
Vendor Product Version
n/a Spring Web Flow Affected: Spring Web Flow
Date Public ?
2017-06-12 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T14:47:44.336Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "98785",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/98785"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://pivotal.io/security/cve-2017-4971"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://jira.spring.io/browse/SWF-1700"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Spring Web Flow",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Spring Web Flow"
            }
          ]
        }
      ],
      "datePublic": "2017-06-12T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in Pivotal Spring Web Flow through 2.4.4. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to \u0027false\u0027) can be vulnerable to malicious EL expressions in view states that process form submissions but do not have a sub-element to declare explicit data binding property mappings."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Data Binding Expression Vulnerability in Spring Web Flow",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-06-13T09:57:01.000Z",
        "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
        "shortName": "dell"
      },
      "references": [
        {
          "name": "98785",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/98785"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://pivotal.io/security/cve-2017-4971"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://jira.spring.io/browse/SWF-1700"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security_alert@emc.com",
          "ID": "CVE-2017-4971",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Spring Web Flow",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Spring Web Flow"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in Pivotal Spring Web Flow through 2.4.4. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to \u0027false\u0027) can be vulnerable to malicious EL expressions in view states that process form submissions but do not have a sub-element to declare explicit data binding property mappings."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Data Binding Expression Vulnerability in Spring Web Flow"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "98785",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/98785"
            },
            {
              "name": "https://pivotal.io/security/cve-2017-4971",
              "refsource": "CONFIRM",
              "url": "https://pivotal.io/security/cve-2017-4971"
            },
            {
              "name": "https://jira.spring.io/browse/SWF-1700",
              "refsource": "CONFIRM",
              "url": "https://jira.spring.io/browse/SWF-1700"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
    "assignerShortName": "dell",
    "cveId": "CVE-2017-4971",
    "datePublished": "2017-06-13T06:00:00.000Z",
    "dateReserved": "2016-12-29T00:00:00.000Z",
    "dateUpdated": "2024-08-05T14:47:44.336Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pivotal:spring_web_flow:2.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59073ACA-F7C5-4C50-85E7-80073ED4358A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pivotal:spring_web_flow:2.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C2CF5C8-DA12-4778-9072-27F27BACAF8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pivotal:spring_web_flow:2.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32B5074F-2E48-4A4E-AA19-D8883775A818\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pivotal:spring_web_flow:2.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB71B411-A6F7-4EE3-BE6C-91DFF15DA656\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"An issue was discovered in Pivotal Spring Web Flow through 2.4.4. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to \u0027false\u0027) can be vulnerable to malicious EL expressions in view states that process form submissions but do not have a sub-element to declare explicit data binding property mappings.\"}, {\"lang\": \"es\", \"value\": \"Se detect\\u00f3 un problema en Spring Web Flow hasta versi\\u00f3n 2.4.4 de Pivotal. Las aplicaciones que no cambian el valor de la propiedad useSpringBinding de MvcViewFactoryCreator que est\\u00e1 deshabilitada por defecto (es decir, ajustada en \\\"false\\\") pueden ser vulnerables a expresiones EL maliciosas en los estados de vista que procesan env\\u00edos de formularios pero no tienen un subelemento para declarar asignaciones expl\\u00edcitas de propiedad de enlace de datos.\"}]",
      "id": "CVE-2017-4971",
      "lastModified": "2024-11-21T03:26:46.743",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N\", \"baseScore\": 5.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2017-06-13T06:29:00.597",
      "references": "[{\"url\": \"http://www.securityfocus.com/bid/98785\", \"source\": \"security_alert@emc.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://jira.spring.io/browse/SWF-1700\", \"source\": \"security_alert@emc.com\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://pivotal.io/security/cve-2017-4971\", \"source\": \"security_alert@emc.com\", \"tags\": [\"Mitigation\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/98785\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://jira.spring.io/browse/SWF-1700\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://pivotal.io/security/cve-2017-4971\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mitigation\", \"Patch\", \"Vendor Advisory\"]}]",
      "sourceIdentifier": "security_alert@emc.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-1188\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2017-4971\",\"sourceIdentifier\":\"security_alert@emc.com\",\"published\":\"2017-06-13T06:29:00.597\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in Pivotal Spring Web Flow through 2.4.4. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to \u0027false\u0027) can be vulnerable to malicious EL expressions in view states that process form submissions but do not have a sub-element to declare explicit data binding property mappings.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 un problema en Spring Web Flow hasta versi\u00f3n 2.4.4 de Pivotal. Las aplicaciones que no cambian el valor de la propiedad useSpringBinding de MvcViewFactoryCreator que est\u00e1 deshabilitada por defecto (es decir, ajustada en \\\"false\\\") pueden ser vulnerables a expresiones EL maliciosas en los estados de vista que procesan env\u00edos de formularios pero no tienen un subelemento para declarar asignaciones expl\u00edcitas de propiedad de enlace de datos.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1188\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pivotal:spring_web_flow:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59073ACA-F7C5-4C50-85E7-80073ED4358A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pivotal:spring_web_flow:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C2CF5C8-DA12-4778-9072-27F27BACAF8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pivotal:spring_web_flow:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32B5074F-2E48-4A4E-AA19-D8883775A818\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pivotal:spring_web_flow:2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB71B411-A6F7-4EE3-BE6C-91DFF15DA656\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/98785\",\"source\":\"security_alert@emc.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://jira.spring.io/browse/SWF-1700\",\"source\":\"security_alert@emc.com\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://pivotal.io/security/cve-2017-4971\",\"source\":\"security_alert@emc.com\",\"tags\":[\"Mitigation\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/98785\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://jira.spring.io/browse/SWF-1700\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://pivotal.io/security/cve-2017-4971\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Patch\",\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…