This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is supplied.
References
Link | Resource |
---|---|
https://pivotal.io/security/cve-2019-3802 | Vendor Advisory |
https://pivotal.io/security/cve-2019-3802 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://pivotal.io/security/cve-2019-3802 - Vendor Advisory |
Information
Published : 2019-06-03 14:29
Updated : 2024-11-21 04:42
NVD link : CVE-2019-3802
Mitre link : CVE-2019-3802
CVE.ORG link : CVE-2019-3802
JSON object : View
Products Affected
pivotal_software
- spring_data_java_persistance_api
CWE