Vulnerability Description
SQL injection vulnerability in Pivotal Spring Data JPA before 1.9.6 (Gosling SR6) and 1.10.x before 1.10.4 (Hopper SR4), when used with a repository that defines a String query using the @Query annotation, allows attackers to execute arbitrary JPQL commands via a sort instance with a function call.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pivotal Software | Spring Data Jpa | <= 1.9.4 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/93276
- https://github.com/spring-projects/spring-data-jpa/commit/b8e7fePatch
- https://jira.spring.io/browse/DATAJPA-965MitigationVendor Advisory
- https://pivotal.io/security/cve-2016-6652Vendor Advisory
- https://security.gentoo.org/glsa/201701-01
- http://www.securityfocus.com/bid/93276
- https://github.com/spring-projects/spring-data-jpa/commit/b8e7fePatch
- https://jira.spring.io/browse/DATAJPA-965MitigationVendor Advisory
- https://pivotal.io/security/cve-2016-6652Vendor Advisory
- https://security.gentoo.org/glsa/201701-01
FAQ
What is CVE-2016-6652?
CVE-2016-6652 is a vulnerability with a CVSS score of 5.6 (MEDIUM). SQL injection vulnerability in Pivotal Spring Data JPA before 1.9.6 (Gosling SR6) and 1.10.x before 1.10.4 (Hopper SR4), when used with a repository that defines a String query using the @Query annota...
How severe is CVE-2016-6652?
CVE-2016-6652 has been rated MEDIUM with a CVSS base score of 5.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-6652?
Check the references section above for vendor advisories and patch information. Affected products include: Pivotal Software Spring Data Jpa.