This affects Spring Data JPA in versions up to and including 2.1.5, 2.0.13 and 1.11.19. Derived queries using any of the predicates ‘startingWith’, ‘endingWith’ or ‘containing’ could return more results than anticipated when a maliciously crafted query parameter value is supplied. Also, LIKE expressions in manually defined queries could return unexpected results if the parameter values bound did not have escaped reserved characters properly.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-0471 This affects Spring Data JPA in versions up to and including 2.1.5, 2.0.13 and 1.11.19. Derived queries using any of the predicates ‘startingWith’, ‘endingWith’ or ‘containing’ could return more results than anticipated when a maliciously crafted query parameter value is supplied. Also, LIKE expressions in manually defined queries could return unexpected results if the parameter values bound did not have escaped reserved characters properly.
Github GHSA Github GHSA GHSA-jgmr-wrwx-mgfj Exposure of Sensitive Information to an Unauthorized Actor and SQL Injection in Spring Data JPA
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2024-09-16T17:33:03.727Z

Reserved: 2019-01-03T00:00:00

Link: CVE-2019-3797

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-05-06T16:29:01.460

Modified: 2024-11-21T04:42:33.580

Link: CVE-2019-3797

cve-icon Redhat

Severity : Low

Publid Date: 2019-04-08T00:00:00Z

Links: CVE-2019-3797 - Bugzilla

cve-icon OpenCVE Enrichment

No data.