Description
This affects Spring Data JPA in versions up to and including 2.1.5, 2.0.13 and 1.11.19. Derived queries using any of the predicates ‘startingWith’, ‘endingWith’ or ‘containing’ could return more results than anticipated when a maliciously crafted query parameter value is supplied. Also, LIKE expressions in manually defined queries could return unexpected results if the parameter values bound did not have escaped reserved characters properly.
Published: 2019-05-06
Score: 3.5 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-0471 This affects Spring Data JPA in versions up to and including 2.1.5, 2.0.13 and 1.11.19. Derived queries using any of the predicates ‘startingWith’, ‘endingWith’ or ‘containing’ could return more results than anticipated when a maliciously crafted query parameter value is supplied. Also, LIKE expressions in manually defined queries could return unexpected results if the parameter values bound did not have escaped reserved characters properly.
Github GHSA Github GHSA GHSA-jgmr-wrwx-mgfj Exposure of Sensitive Information to an Unauthorized Actor and SQL Injection in Spring Data JPA
History

No history.

Subscriptions

Pivotal Software Spring Data Java Persistence Api
Redhat Jboss Fuse
cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2024-09-16T17:33:03.727Z

Reserved: 2019-01-03T00:00:00.000Z

Link: CVE-2019-3797

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-05-06T16:29:01.460

Modified: 2024-11-21T04:42:33.580

Link: CVE-2019-3797

cve-icon Redhat

Severity : Low

Publid Date: 2019-04-08T00:00:00Z

Links: CVE-2019-3797 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses