// For flags

CVE-2019-3802

Additional information exposure with Spring Data JPA example matcher

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is supplied.

Esto afecta a Spring Data JPA en versiones hasta 2.1.6, 2.0.14 y 1.11.20 inclusive. ExampleMatcher utilizando ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING o ExampleMatcher.StringMatcher.CONTAINING puede devolver más resultados de los anticipados cuando se proporciona un valor de ejemplo maliciosamente manipulado .

This release of Red Hat Fuse 7.6.0 serves as a replacement for Red Hat Fuse 7.5, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, cross site scripting, denial of service, deserialization, and information leakage vulnerabilities.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-01-03 CVE Reserved
  • 2019-06-03 CVE Published
  • 2024-09-17 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-155: Improper Neutralization of Wildcards or Matching Symbols
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Pivotal Software
Search vendor "Pivotal Software"
Spring Data Java Persistance Api
Search vendor "Pivotal Software" for product "Spring Data Java Persistance Api"
>= 1.11.0 <= 1.11.21
Search vendor "Pivotal Software" for product "Spring Data Java Persistance Api" and version " >= 1.11.0 <= 1.11.21"
-
Affected
Pivotal Software
Search vendor "Pivotal Software"
Spring Data Java Persistance Api
Search vendor "Pivotal Software" for product "Spring Data Java Persistance Api"
>= 2.0.0 <= 2.0.14
Search vendor "Pivotal Software" for product "Spring Data Java Persistance Api" and version " >= 2.0.0 <= 2.0.14"
-
Affected
Pivotal Software
Search vendor "Pivotal Software"
Spring Data Java Persistance Api
Search vendor "Pivotal Software" for product "Spring Data Java Persistance Api"
>= 2.1.0 <= 2.1.7
Search vendor "Pivotal Software" for product "Spring Data Java Persistance Api" and version " >= 2.1.0 <= 2.1.7"
-
Affected