A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Beta1. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks.

Project Subscriptions

Vendors Products
Hibernate Subscribe
Hibernate Orm Subscribe
Quarkus Subscribe
Quarkus Subscribe
Build Of Quarkus Subscribe
Decision Manager Subscribe
Enterprise Linux Subscribe
Jboss Data Grid Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Enterprise Application Platform Cd Subscribe
Jboss Enterprise Bpms Platform Subscribe
Jboss Enterprise Brms Platform Subscribe
Jboss Fuse Subscribe
Jboss Middleware Text-only Advisories Subscribe
Jboss Single Sign On Subscribe
Openshift Application Runtimes Subscribe
Openstack Subscribe
Single Sign-on Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-0917 A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Beta1. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks.
Github GHSA Github GHSA GHSA-8grg-q944-cch5 SQL Injection in Hibernate ORM
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T00:26:39.118Z

Reserved: 2019-08-10T00:00:00

Link: CVE-2019-14900

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-07-06T19:15:12.230

Modified: 2024-11-21T04:27:38.783

Link: CVE-2019-14900

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-05-12T00:00:00Z

Links: CVE-2019-14900 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses