CVE-2016-6652
Severity CVSS v4.0:
Pending analysis
Type:
CWE-89
SQL Injection
Publication date:
05/10/2016
Last modified:
12/04/2025
Description
SQL injection vulnerability in Pivotal Spring Data JPA before 1.9.6 (Gosling SR6) and 1.10.x before 1.10.4 (Hopper SR4), when used with a repository that defines a String query using the @Query annotation, allows attackers to execute arbitrary JPQL commands via a sort instance with a function call.
Impact
Base Score 3.x
5.60
Severity 3.x
MEDIUM
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:pivotal_software:spring_data_jpa:*:*:*:*:*:*:*:* | 1.9.4 (including) | |
| cpe:2.3:a:pivotal_software:spring_data_jpa:1.10.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/93276
- https://github.com/spring-projects/spring-data-jpa/commit/b8e7fe
- https://jira.spring.io/browse/DATAJPA-965
- https://pivotal.io/security/cve-2016-6652
- https://security.gentoo.org/glsa/201701-01
- http://www.securityfocus.com/bid/93276
- https://github.com/spring-projects/spring-data-jpa/commit/b8e7fe
- https://jira.spring.io/browse/DATAJPA-965
- https://pivotal.io/security/cve-2016-6652
- https://security.gentoo.org/glsa/201701-01



