CVE-2017-4974: Blind SQL Injection with privileged Cloud Foundry UAA endpoints
6.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.51229%
CWE
Published
5/13/2022
Updated
3/1/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.cloudfoundry.identity:cloudfoundry-identity-server | maven | >= 2.0.0, < 2.7.4.15 | 2.7.4.15 |
org.cloudfoundry.identity:cloudfoundry-identity-server | maven | >= 3.0.0, < 3.6.9 | 3.6.9 |
org.cloudfoundry.identity:cloudfoundry-identity-server | maven | >= 3.7.0, < 3.9.11 | 3.9.11 |
org.cloudfoundry.identity:cloudfoundry-identity-server | maven | >= 3.10.0, < 3.16.0 | 3.16.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insufficient input validation in SCIM filter processing. The patch added a VALID_ATTRIBUTE_NAMES whitelist and validateFilterAttributes method to check filter components. The original scimFilter method (before validation was added) directly parsed user input without these security checks, making it the injection vector. The commit diff clearly shows the security validation was missing in the vulnerable versions.