CVE-2019-3802

This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is supplied.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:pivotal_software:spring_data_java_persistance_api:*:*:*:*:*:*:*:*
cpe:2.3:a:pivotal_software:spring_data_java_persistance_api:*:*:*:*:*:*:*:*
cpe:2.3:a:pivotal_software:spring_data_java_persistance_api:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:42

Type Values Removed Values Added
References () https://pivotal.io/security/cve-2019-3802 - Vendor Advisory () https://pivotal.io/security/cve-2019-3802 - Vendor Advisory

Information

Published : 2019-06-03 14:29

Updated : 2024-11-21 04:42


NVD link : CVE-2019-3802

Mitre link : CVE-2019-3802

CVE.ORG link : CVE-2019-3802


JSON object : View

Products Affected

pivotal_software

  • spring_data_java_persistance_api
CWE
CWE-155

Improper Neutralization of Wildcards or Matching Symbols

NVD-CWE-Other