Description
This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is supplied.
Remediation
References
https://pivotal.io/security/cve-2019-3802
Related Vulnerabilities
CVE-2023-48223 Vulnerability in npm package fast-jwt
CVE-2022-36098 Vulnerability in maven package org.xwiki.platform:xwiki-platform-mentions-ui
CVE-2023-25158 Vulnerability in maven package org.geotools.jdbc:gt-jdbc-oracle
CVE-2017-1000092 Vulnerability in maven package org.jenkins-ci.plugins:git
CVE-2023-6394 Vulnerability in maven package io.quarkus:quarkus-smallrye-graphql-client