CVE-2020-5428: SQL Injection in Spring Cloud Task
6
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.50791%
CWE
Published
2/9/2022
Updated
2/1/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.springframework.cloud:spring-cloud-task-dependencies | maven | < 2.2.5 | 2.2.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper handling of sort parameters in SQL queries within TaskExplorer. Analysis of Spring Data patterns indicates:
- ORDER BY clause construction methods (createOrderClause) would be vulnerable to injection if using raw user input
- Public TaskExplorer interface methods (getTaskExecutions) serve as the entry point for malicious sort parameters
- The JDBC implementation layer would be where unsanitized parameters meet SQL string construction While exact patch details aren't shown, the CWE-89 classification and Spring Cloud Task architecture strongly suggest these are the vulnerable code paths that would appear in call stacks during exploitation.