Description
SQL injection vulnerability in Pivotal Spring Data JPA before 1.9.6 (Gosling SR6) and 1.10.x before 1.10.4 (Hopper SR4), when used with a repository that defines a String query using the @Query annotation, allows attackers to execute arbitrary JPQL commands via a sort instance with a function call.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5849 | SQL injection vulnerability in Pivotal Spring Data JPA before 1.9.6 (Gosling SR6) and 1.10.x before 1.10.4 (Hopper SR4), when used with a repository that defines a String query using the @Query annotation, allows attackers to execute arbitrary JPQL commands via a sort instance with a function call. |
Github GHSA |
GHSA-xr4v-28rm-pvgw | Improper Neutralization of Special Elements used in an SQL Command Pivotal Spring Data JPA |
References
History
No history.
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2024-08-06T01:36:29.349Z
Reserved: 2016-08-10T00:00:00.000Z
Link: CVE-2016-6652
No data.
Status : Modified
Published: 2016-10-05T16:59:04.757
Modified: 2026-05-06T22:30:45.220
Link: CVE-2016-6652
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA