← Back to CVEs
CVE-2016-6652
N/ADescription
SQL injection vulnerability in Pivotal Spring Data JPA before 1.9.6 (Gosling SR6) and 1.10.x before 1.10.4 (Hopper SR4), when used with a repository that defines a String query using the @Query annotation, allows attackers to execute arbitrary JPQL commands via a sort instance with a function call.
CVE Details
CVSS v3.1 ScoreN/A
Published10/5/2016
Last Modified5/6/2026
Sourcenvd
Honeypot Sightings0
Affected Products
pivotal_software:spring_data_jpa
Weaknesses (CWE)
CWE-89
References
http://www.securityfocus.com/bid/93276(security_alert@emc.com)
https://github.com/spring-projects/spring-data-jpa/commit/b8e7fe(security_alert@emc.com)
https://jira.spring.io/browse/DATAJPA-965(security_alert@emc.com)
https://pivotal.io/security/cve-2016-6652(security_alert@emc.com)
https://security.gentoo.org/glsa/201701-01(security_alert@emc.com)
http://www.securityfocus.com/bid/93276(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/spring-projects/spring-data-jpa/commit/b8e7fe(af854a3a-2127-422b-91ae-364da2661108)
https://jira.spring.io/browse/DATAJPA-965(af854a3a-2127-422b-91ae-364da2661108)
https://pivotal.io/security/cve-2016-6652(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201701-01(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.