Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:pivotal:spring_web_flow:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "59073ACA-F7C5-4C50-85E7-80073ED4358A", "vulnerable": true}, {"criteria": "cpe:2.3:a:pivotal:spring_web_flow:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C2CF5C8-DA12-4778-9072-27F27BACAF8C", "vulnerable": true}, {"criteria": "cpe:2.3:a:pivotal:spring_web_flow:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "32B5074F-2E48-4A4E-AA19-D8883775A818", "vulnerable": true}, {"criteria": "cpe:2.3:a:pivotal:spring_web_flow:2.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "CB71B411-A6F7-4EE3-BE6C-91DFF15DA656", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in Pivotal Spring Web Flow through 2.4.4. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to 'false') can be vulnerable to malicious EL expressions in view states that process form submissions but do not have a sub-element to declare explicit data binding property mappings."}, {"lang": "es", "value": "Se detect\u00f3 un problema en Spring Web Flow hasta versi\u00f3n 2.4.4 de Pivotal. Las aplicaciones que no cambian el valor de la propiedad useSpringBinding de MvcViewFactoryCreator que est\u00e1 deshabilitada por defecto (es decir, ajustada en \"false\") pueden ser vulnerables a expresiones EL maliciosas en los estados de vista que procesan env\u00edos de formularios pero no tienen un subelemento para declarar asignaciones expl\u00edcitas de propiedad de enlace de datos."}], "id": "CVE-2017-4971", "lastModified": "2024-11-21T03:26:46.743", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0"}, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-06-13T06:29:00.597", "references": [{"source": "security_alert@emc.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/98785"}, {"source": "security_alert@emc.com", "tags": ["Issue Tracking", "Patch"], "url": "https://jira.spring.io/browse/SWF-1700"}, {"source": "security_alert@emc.com", "tags": ["Mitigation", "Patch", "Vendor Advisory"], "url": "https://pivotal.io/security/cve-2017-4971"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/98785"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Patch"], "url": "https://jira.spring.io/browse/SWF-1700"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mitigation", "Patch", "Vendor Advisory"], "url": "https://pivotal.io/security/cve-2017-4971"}], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-1188"}], "source": "nvd@nist.gov", "type": "Primary"}]}