Description
This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is supplied.
Remediation
References
https://pivotal.io/security/cve-2019-3802
Related Vulnerabilities
CVE-2022-31160 Vulnerability in maven package org.fujion.webjars:jquery-ui
CVE-2020-10203 Vulnerability in maven package org.sonatype.nexus:nexus-core
CVE-2022-45935 Vulnerability in maven package org.apache.james:james-server-core
CVE-2022-41232 Vulnerability in maven package org.jenkins-ci.plugins:build-publisher
CVE-2020-2301 Vulnerability in maven package org.jenkins-ci.plugins:active-directory