-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.springframework.data:spring-data-jpa | maven | < 1.9.6 | 1.9.6 |
| org.springframework.data:spring-data-jpa | maven | >= 1.10.0, < 1.10.4 | 1.10.4 |
The vulnerability stems from improper handling of Sort parameters in Spring Data JPA's query construction. The commit b8e7fe introduced JpaSort.unsafe() and validation in QueryUtils, indicating that prior versions lacked these safeguards. The applySort function appended user-controlled Sort values directly to JPQL queries, enabling injection. The JpaOrder class's original implementation did not enforce safety checks for function calls in Sort instances, allowing attackers to manipulate ORDER BY clauses. These two components directly contributed to the SQL injection vector described in CVE-2016-6652.
Ongoing coverage of React2Shell