HTTP: Spring Web Flow SPEL Command Injection

This signature detects attempts to exploit a known vulnerability against Spring Web Flow SPEL. A successful attack can lead to arbitrary code execution.

Extended Description

An issue was discovered in Pivotal Spring Web Flow through 2.4.4. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to 'false') can be vulnerable to malicious EL expressions in view states that process form submissions but do not have a sub-element to declare explicit data binding property mappings.

Affected Products

Pivotal spring_web_flow

References

BugTraq: 98785

CVE: CVE-2017-4971

Short Name
HTTP:MISC:SPRING-WEB-CMD-INJ
Severity
Minor
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2017-4971 Command Flow Injection SPEL Spring Web bid:98785
Release Date
10/31/2018
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3415
False Positive
Unknown
Vendors

Pivotal

CVSS Score

4.3

Found a potential security threat?