HTTP RULE(RULE ID:321921)

Rule General Information
Release Date: 2019-06-24
Rule Name: Spring Web Flow SPEL Command Injection Vulnerability (CVE-2017-4971)
Severity: Critical
CVE ID: CVE-2017-4971
Rule Protection Details
Description: An issue was discovered in Pivotal Spring Web Flow through 2.4.4. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to 'false') can be vulnerable to malicious EL expressions in view states that process form submissions but do not have a sub-element to declare explicit data binding property mappings.
Impact: An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, FreeBSD, Solaris
Reference: SecurityFocusBID:98785
https://jira.spring.io/browse/SWF-1700
https://pivotal.io/security/cve-2017-4971
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://pivotal.io/security/cve-2017-4971