{"api_version":"1","generated_at":"2026-04-23T15:17:36+00:00","cve":"CVE-2017-4971","urls":{"html":"https://cve.report/CVE-2017-4971","api":"https://cve.report/api/cve/CVE-2017-4971.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-4971","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-4971"},"summary":{"title":"CVE-2017-4971","description":"An issue was discovered in Pivotal Spring Web Flow through 2.4.4. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to 'false') can be vulnerable to malicious EL expressions in view states that process form submissions but do not have a sub-element to declare explicit data binding property mappings.","state":"PUBLIC","assigner":"security_alert@emc.com","published_at":"2017-06-13 06:29:00","updated_at":"2019-10-03 00:03:00"},"problem_types":["CWE-1188"],"metrics":[],"references":[{"url":"https://jira.spring.io/browse/SWF-1700","name":"https://jira.spring.io/browse/SWF-1700","refsource":"CONFIRM","tags":["Issue Tracking","Patch"],"title":"[SWF-1700] CVE-2017-4971: Avoid use of SpEL parser for empty value expressions - Spring JIRA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://pivotal.io/security/cve-2017-4971","name":"https://pivotal.io/security/cve-2017-4971","refsource":"CONFIRM","tags":["Mitigation","Patch","Vendor Advisory"],"title":"CVE-2017-4971: Data Binding Expression Vulnerability in Spring Web Flow | Security | Pivotal","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/98785","name":"98785","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"Pivotal Spring Web Flow CVE-2017-4971 Security Bypass Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-4971","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-4971","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"4971","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pivotal","cpe5":"spring_web_flow","cpe6":"2.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"4971","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pivotal","cpe5":"spring_web_flow","cpe6":"2.4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"4971","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pivotal","cpe5":"spring_web_flow","cpe6":"2.4.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"4971","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pivotal","cpe5":"spring_web_flow","cpe6":"2.4.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"4971","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pivotal","cpe5":"spring_web_flow","cpe6":"2.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"4971","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pivotal","cpe5":"spring_web_flow","cpe6":"2.4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"4971","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pivotal","cpe5":"spring_web_flow","cpe6":"2.4.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"4971","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pivotal","cpe5":"spring_web_flow","cpe6":"2.4.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2017-4971","qid":"377315","title":"Spring Web Flow Data Binding Expression Vulnerability"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security_alert@emc.com","ID":"CVE-2017-4971","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Spring Web Flow","version":{"version_data":[{"version_value":"Spring Web Flow"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in Pivotal Spring Web Flow through 2.4.4. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to 'false') can be vulnerable to malicious EL expressions in view states that process form submissions but do not have a sub-element to declare explicit data binding property mappings."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Data Binding Expression Vulnerability in Spring Web Flow"}]}]},"references":{"reference_data":[{"name":"98785","refsource":"BID","url":"http://www.securityfocus.com/bid/98785"},{"name":"https://pivotal.io/security/cve-2017-4971","refsource":"CONFIRM","url":"https://pivotal.io/security/cve-2017-4971"},{"name":"https://jira.spring.io/browse/SWF-1700","refsource":"CONFIRM","url":"https://jira.spring.io/browse/SWF-1700"}]}},"nvd":{"publishedDate":"2017-06-13 06:29:00","lastModifiedDate":"2019-10-03 00:03:00","problem_types":["CWE-1188"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.2,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pivotal:spring_web_flow:2.4.4:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pivotal:spring_web_flow:2.4.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pivotal:spring_web_flow:2.4.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pivotal:spring_web_flow:2.4.2:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"4971","Ordinal":"101436","Title":"CVE-2017-4971","CVE":"CVE-2017-4971","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"4971","Ordinal":"1","NoteData":"An issue was discovered in Pivotal Spring Web Flow through 2.4.4. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to 'false') can be vulnerable to malicious EL expressions in view states that process form submissions but do not have a sub-element to declare explicit data binding property mappings.","Type":"Description","Title":null},{"CveYear":"2017","CveId":"4971","Ordinal":"2","NoteData":"2017-06-13","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"4971","Ordinal":"3","NoteData":"2017-06-13","Type":"Other","Title":"Modified"}]}}}