A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Beta1. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*"
],
"vendor_product": "redhat:decision_manager",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:redhat:fuse:*:*:*:*:*:*:*:*"
],
"vendor_product": "redhat:fuse",
"extracted_events": [
{
"fixed": "7.8.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*"
],
"vendor_product": "redhat:jboss_data_grid",
"extracted_events": [
{
"last_affected": "7.0.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.4:*:*:*:*:*:*:*"
],
"vendor_product": "redhat:jboss_enterprise_application_platform",
"extracted_events": [
{
"last_affected": "7.3"
},
{
"last_affected": "7.4"
},
{
"last_affected": "7.3"
},
{
"last_affected": "7.4"
},
{
"last_affected": "7.3"
},
{
"last_affected": "7.2"
},
{
"last_affected": "7.2"
},
{
"last_affected": "7.2"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:*"
],
"vendor_product": "redhat:openstack",
"extracted_events": [
{
"last_affected": "10"
},
{
"last_affected": "13"
},
{
"last_affected": "14"
}
]
}
]
}