You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/data/spring-data-commons/1.10.1.RELEASE/spring-data-commons-1.10.1.RELEASE.jar
Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack.
SQL injection vulnerability in Pivotal Spring Data JPA before 1.9.6 (Gosling SR6) and 1.10.x before 1.10.4 (Hopper SR4), when used with a repository that defines a String query using the @query annotation, allows attackers to execute arbitrary JPQL commands via a sort instance with a function call.
mend-for-github-combot
changed the title
spring-data-jpa-1.8.1.RELEASE.jar: 2 vulnerabilities (highest severity is: 9.8)
spring-data-jpa-1.8.1.RELEASE.jar: 2 vulnerabilities (highest severity is: 9.8) non-reachable
Jul 2, 2023
mend-for-github-combot
changed the title
spring-data-jpa-1.8.1.RELEASE.jar: 2 vulnerabilities (highest severity is: 9.8) non-reachable
spring-data-jpa-1.8.1.RELEASE.jar: 2 vulnerabilities (highest severity is: 9.8) unreachable
Feb 28, 2024
mend-for-github-combot
changed the title
spring-data-jpa-1.8.1.RELEASE.jar: 2 vulnerabilities (highest severity is: 9.8) unreachable
spring-data-jpa-1.8.1.RELEASE.jar: 1 vulnerabilities (highest severity is: 9.8) unreachable
Apr 12, 2024
mend-for-github-combot
changed the title
spring-data-jpa-1.8.1.RELEASE.jar: 1 vulnerabilities (highest severity is: 9.8) unreachable
spring-data-jpa-1.8.1.RELEASE.jar: 2 vulnerabilities (highest severity is: 9.8) unreachable
Aug 16, 2024
Vulnerable Library - spring-data-jpa-1.8.1.RELEASE.jar
Spring Data module for JPA repositories.
Library home page: http://www.spring.io
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/data/spring-data-jpa/1.8.1.RELEASE/spring-data-jpa-1.8.1.RELEASE.jar
Found in HEAD commit: 643a7fad08d6608eaf25b22f87aee4b43387f2fc
Vulnerabilities
Unreachable
Unreachable
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2018-1273
Vulnerable Library - spring-data-commons-1.10.1.RELEASE.jar
Global parent pom.xml to be used by Spring Data modules
Library home page: http://www.spring.io
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/data/spring-data-commons/1.10.1.RELEASE/spring-data-commons-1.10.1.RELEASE.jar
Dependency Hierarchy:
Found in HEAD commit: 643a7fad08d6608eaf25b22f87aee4b43387f2fc
Found in base branch: vp-rem
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack.
Publish Date: 2018-04-11
URL: CVE-2018-1273
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://tanzu.vmware.com/security/cve-2018-1273
Release Date: 2018-04-11
Fix Resolution (org.springframework.data:spring-data-commons): 1.13.11.RELEASE
Direct dependency fix Resolution (org.springframework.data:spring-data-jpa): 1.11.11.RELEASE
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2016-6652
Vulnerable Library - spring-data-jpa-1.8.1.RELEASE.jar
Spring Data module for JPA repositories.
Library home page: http://www.spring.io
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/data/spring-data-jpa/1.8.1.RELEASE/spring-data-jpa-1.8.1.RELEASE.jar
Dependency Hierarchy:
Found in HEAD commit: 643a7fad08d6608eaf25b22f87aee4b43387f2fc
Found in base branch: vp-rem
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
SQL injection vulnerability in Pivotal Spring Data JPA before 1.9.6 (Gosling SR6) and 1.10.x before 1.10.4 (Hopper SR4), when used with a repository that defines a String query using the @query annotation, allows attackers to execute arbitrary JPQL commands via a sort instance with a function call.
Publish Date: 2016-10-05
URL: CVE-2016-6652
CVSS 3 Score Details (5.6)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6652
Release Date: 2016-10-05
Fix Resolution: 1.9.6.RELEASE
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.
The text was updated successfully, but these errors were encountered: