A flaw was found in hibernate-core in versions prior to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 05:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1881353 - Issue Tracking, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/r833c1276e41334fa675848a08daf0c61f39009f9f9a400d9f7006d44%40%3Cdev.turbine.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rf2378209c676a28b71f9b604a3b3517c448540b85367160e558ef9df%40%3Ccommits.turbine.apache.org%3E - | |
References | () https://lists.debian.org/debian-lts-announce/2021/01/msg00000.html - Mailing List, Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-4908 - Third Party Advisory | |
References | () https://www.oracle.com//security-alerts/cpujul2021.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujul2022.html - Patch, Third Party Advisory |
Information
Published : 2020-12-02 15:15
Updated : 2025-04-23 20:15
NVD link : CVE-2020-25638
Mitre link : CVE-2020-25638
CVE.ORG link : CVE-2020-25638
JSON object : View
Products Affected
oracle
- communications_cloud_native_core_console
- retail_customer_management_and_segmentation_foundation
debian
- debian_linux
hibernate
- hibernate_orm
quarkus
- quarkus
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')