CVE-2019-3797

LOW
3.5CVSS
Published: 2019-05-06
Updated: 2024-11-21
AI Analysis

Description

This affects Spring Data JPA in versions up to and including 2.1.5, 2.0.13 and 1.11.19. Derived queries using any of the predicates ‘startingWith’, ‘endingWith’ or ‘containing’ could return more results than anticipated when a maliciously crafted query parameter value is supplied. Also, LIKE expressions in manually defined queries could return unexpected results if the parameter values bound did not have escaped reserved characters properly.

CVSS Metrics

Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
Attack Vector
network
Complexity
low
Privileges
low
User Action
required
Scope
unchanged
Confidentiality
low
Integrity
none
Availability
none
Weaknesses
CWE-89CWE-200

Metadata

Primary Vendor
PIVOTAL_SOFTWARE
Published
5/6/2019
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

pivotal_software : spring_data_java_persistence_apipivotal_software : spring_data_java_persistence_apipivotal_software : spring_data_java_persistence_api

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2019-3797 | LOW Severity | CVEDatabase.com | CVEDatabase.com