Description
This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is supplied.
Remediation
References
https://pivotal.io/security/cve-2019-3802
Related Vulnerabilities
CVE-2022-36899 Vulnerability in maven package com.compuware.jenkins:compuware-ispw-operations
CVE-2015-5344 Vulnerability in maven package org.apache.camel:camel-core
CVE-2022-34791 Vulnerability in maven package io.jenkins.plugins:validating-email-parameter
CVE-2018-14042 Vulnerability in maven package org.webjars.bowergithub.angular-ui:bootstrap
CVE-2017-7676 Vulnerability in maven package org.apache.ranger:ranger