CVE-2019-3797
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
06/05/2019
Last modified:
10/02/2020
Description
This affects Spring Data JPA in versions up to and including 2.1.5, 2.0.13 and 1.11.19. Derived queries using any of the predicates ‘startingWith’, ‘endingWith’ or ‘containing’ could return more results than anticipated when a maliciously crafted query parameter value is supplied. Also, LIKE expressions in manually defined queries could return unexpected results if the parameter values bound did not have escaped reserved characters properly.
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:pivotal_software:spring_data_java_persistence_api:*:*:*:*:*:*:*:* | 1.11.0 (including) | 1.11.19 (including) |
| cpe:2.3:a:pivotal_software:spring_data_java_persistence_api:*:*:*:*:*:*:*:* | 2.0.0 (including) | 2.0.13 (including) |
| cpe:2.3:a:pivotal_software:spring_data_java_persistence_api:*:*:*:*:*:*:*:* | 2.1.0 (including) | 2.1.5 (including) |
To consult the complete list of CPE names with products and versions, see this page



