Information Exposure Affecting org.springframework.data:spring-data-jpa package, versions [2.0.0.RELEASE, 2.0.14.RELEASE) [2.1.0.RELEASE, 2.1.6.RELEASE) [, 1.11.20.RELEASE)
Snyk CVSS
Attack Complexity
High
Threat Intelligence
EPSS
0.08% (35th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGSPRINGFRAMEWORKDATA-174140
- published 9 Apr 2019
- disclosed 8 Apr 2019
- credit Maruthi Adithya G
Introduced: 8 Apr 2019
CVE-2019-3797 Open this link in a new tabHow to fix?
Upgrade org.springframework.data:spring-data-jpa
to version 2.0.14.RELEASE, 2.1.6.RELEASE, 1.11.20.RELEASE or higher.
Overview
org.springframework.data:spring-data-jpa is a package that is used to implement JPA based repositories.
Affected versions of this package are vulnerable to Information Exposure due to the usage of certain derived queries. A maliciously crafted query parameter value supplied with queries using startingWith
, endingWith
, containing
or LIKE expressions could return more results than anticipated, resulting in information exposure.