First published: Mon May 13 2019(Updated: )
This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is supplied.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pivotal Software Spring Data Java Persistance Api | >=1.11.0<=1.11.21 | |
Pivotal Software Spring Data Java Persistance Api | >=2.0.0<=2.0.14 | |
Pivotal Software Spring Data Java Persistance Api | >=2.1.0<=2.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3802 is a vulnerability that affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14, and 1.11.20.
CVE-2019-3802 allows a maliciously crafted ExampleMatcher to return more results than expected.
CVE-2019-3802 has a severity rating of medium with a CVSS score of 5.3.
To fix CVE-2019-3802, upgrade Spring Data JPA to version 2.1.7, 2.0.15, or 1.11.21.
You can find more information about CVE-2019-3802 on the CVE website, NVD, Pivotal Security, Bugzilla, and Red Hat.