SQL injection vulnerability in Pivotal Spring Data JPA before 1.9.6 (Gosling SR6) and 1.10.x before 1.10.4 (Hopper SR4), when used with a repository that defines a String query using the @Query annotation, allows attackers to execute arbitrary JPQL commands via a sort instance with a function call.
{ "nvd_published_at": "2016-10-05T16:59:00Z", "github_reviewed_at": "2022-07-06T19:45:18Z", "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-89" ] }