VYPR
Moderate severityNVD Advisory· Published Jun 3, 2019· Updated Sep 17, 2024

Additional information exposure with Spring Data JPA example matcher

CVE-2019-3802

Description

This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is supplied.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.springframework.data:spring-data-jpaMaven
>= 2.1.0, < 2.1.82.1.8
org.springframework.data:spring-data-jpaMaven
>= 2.0.0, < 2.1.82.1.8
org.springframework.data:spring-data-jpaMaven
< 1.11.221.11.22

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.