Information Exposure Affecting org.springframework.data:spring-data-jpa package, versions [2.0.0.RELEASE, 2.0.14.RELEASE)[2.1.0.RELEASE, 2.1.6.RELEASE)[, 1.11.20.RELEASE)


Severity

Recommended
0.0
low
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.25% (48th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Information Exposure vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGSPRINGFRAMEWORKDATA-174140
  • published9 Apr 2019
  • disclosed8 Apr 2019
  • creditMaruthi Adithya G

Introduced: 8 Apr 2019

CVE-2019-3797  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade org.springframework.data:spring-data-jpa to version 2.0.14.RELEASE, 2.1.6.RELEASE, 1.11.20.RELEASE or higher.

Overview

org.springframework.data:spring-data-jpa is a package that is used to implement JPA based repositories.

Affected versions of this package are vulnerable to Information Exposure due to the usage of certain derived queries. A maliciously crafted query parameter value supplied with queries using startingWith, endingWith, containing or LIKE expressions could return more results than anticipated, resulting in information exposure.

CVSS Base Scores

version 3.1