Description
This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is supplied.
Remediation
References
https://pivotal.io/security/cve-2019-3802
Related Vulnerabilities
CVE-2011-2204 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2019-1354 Vulnerability in maven package org.webjars.npm:nodegit
CVE-2023-22832 Vulnerability in maven package org.apache.nifi:nifi-ccda-processors
CVE-2022-45146 Vulnerability in maven package org.bouncycastle:bc-fips-debug
CVE-2021-40146 Vulnerability in maven package org.apache.any23:apache-any23-core