Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-14900

Опубликовано: 06 июл. 2020
Источник: debian
EPSS Низкий

Описание

A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Beta1. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libhibernate3-javanot-affectedpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1666499

  • https://github.com/hibernate/hibernate-orm/commit/b658e903d71e34a5be5690a33e6faa21b1db628b

  • https://github.com/hibernate/hibernate-orm/commit/7dfb0fdf24fb4a1f757be14ce5806b5a81f20ab8

  • https://github.com/hibernate/hibernate-orm/commit/50a5da07c1e6cb1da630b01c67bce9f7fe49dd8e

EPSS

Процентиль: 80%
0.01405
Низкий

Связанные уязвимости

CVSS3: 6.5
redhat
больше 5 лет назад

A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Beta1. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks.

CVSS3: 6.5
nvd
больше 5 лет назад

A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Beta1. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks.

CVSS3: 6.5
github
почти 4 года назад

SQL Injection in Hibernate ORM

EPSS

Процентиль: 80%
0.01405
Низкий