CVE-2019-3802

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-3802
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-3802.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-3802
Aliases
Published
2019-06-03T14:29:00Z
Modified
2024-10-12T05:13:55.760476Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is supplied.

References

Affected packages

Git / github.com/spring-projects/spring-data-jpa

Affected versions

1.*

1.11.0.RELEASE
1.11.1.RELEASE
1.11.10.RELEASE
1.11.11.RELEASE
1.11.12.RELEASE
1.11.13.RELEASE
1.11.14.RELEASE
1.11.15.RELEASE
1.11.16.RELEASE
1.11.17.RELEASE
1.11.18.RELEASE
1.11.19.RELEASE
1.11.2.RELEASE
1.11.20.RELEASE
1.11.21.RELEASE
1.11.3.RELEASE
1.11.4.RELEASE
1.11.5.RELEASE
1.11.6.RELEASE
1.11.7.RELEASE
1.11.8.RELEASE
1.11.9.RELEASE

2.*

2.0.0.RELEASE
2.0.1.RELEASE
2.0.10.RELEASE
2.0.11.RELEASE
2.0.12.RELEASE
2.0.13.RELEASE
2.0.14.RELEASE
2.0.2.RELEASE
2.0.3.RELEASE
2.0.4.RELEASE
2.0.5.RELEASE
2.0.6.RELEASE
2.0.7.RELEASE
2.0.8.RELEASE
2.0.9.RELEASE
2.1.0.RELEASE
2.1.1.RELEASE
2.1.2.RELEASE
2.1.3.RELEASE
2.1.4.RELEASE
2.1.5.RELEASE
2.1.6.RELEASE
2.1.7.RELEASE