Vulnerability Description
Querydsl 5.1.0 and OpenFeign Querydsl 6.8 allows SQL/HQL injection in orderBy in JPAQuery. NOTE: this is disputed by a Querydsl community member because the product is not intended to defend against a developer who uses untrusted input directly in query construction.
References
- https://github.com/OpenFeign/querydsl/
- https://github.com/OpenFeign/querydsl/pull/742
- https://github.com/OpenFeign/querydsl/pull/743
- https://github.com/OpenFeign/querydsl/releases/tag/5.6.1
- https://github.com/OpenFeign/querydsl/releases/tag/6.10.1
- https://github.com/advisories/GHSA-6q3q-6v5j-h6vg
- https://github.com/querydsl/querydsl/issues/3757
- https://github.com/querydsl/querydsl/releases/tag/QUERYDSL_5_1_0
- https://github.com/spring-projects/spring-data-jpa/issues/3693
- https://www.csirt.sk/querydsl-java-library-vulnerability-permits-sql-hql-injecti
FAQ
What is CVE-2024-49203?
CVE-2024-49203 is a documented vulnerability. Querydsl 5.1.0 and OpenFeign Querydsl 6.8 allows SQL/HQL injection in orderBy in JPAQuery. NOTE: this is disputed by a Querydsl community member because the product is not intended to defend against a...
How severe is CVE-2024-49203?
CVSS scoring is not yet available for CVE-2024-49203. Check NVD for updates.
Is there a patch for CVE-2024-49203?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.