Moderate severityNVD Advisory· Published Jun 3, 2019· Updated Sep 17, 2024
Additional information exposure with Spring Data JPA example matcher
CVE-2019-3802
Description
This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is supplied.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.springframework.data:spring-data-jpaMaven | >= 2.1.0, < 2.1.8 | 2.1.8 |
org.springframework.data:spring-data-jpaMaven | >= 2.0.0, < 2.1.8 | 2.1.8 |
org.springframework.data:spring-data-jpaMaven | < 1.11.22 | 1.11.22 |
Affected products
1- Range: 2.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-xggx-fx6w-v7chghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-3802ghsaADVISORY
- pivotal.io/security/cve-2019-3802ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.