CVE-2024-49203: Querydsl vulnerable to HQL injection trough orderBy
(updated )
The order by method enables injecting HQL queries. This may cause blind HQL injection, which could lead to leakage of sensitive information, and potentially also Denial Of Service. This vulnerability is present since the original querydsl repository(https://github.com/querydsl/querydsl) where it was assigned preliminary CVE identifier CVE-2024-49203.
References
- github.com/CSIRTTrizna/CVE-2024-49203
- github.com/OpenFeign/querydsl
- github.com/OpenFeign/querydsl/releases/tag/5.6.1
- github.com/OpenFeign/querydsl/releases/tag/6.10.1
- github.com/OpenFeign/querydsl/security/advisories/GHSA-6q3q-6v5j-h6vg
- github.com/advisories/GHSA-6q3q-6v5j-h6vg
- github.com/querydsl/querydsl/issues/3757
- github.com/querydsl/querydsl/releases/tag/QUERYDSL_5_1_0
- nvd.nist.gov/vuln/detail/CVE-2024-49203
- www.csirt.sk/querydsl-java-library-vulnerability-permits-sql-hql-injection.html
Detect and mitigate CVE-2024-49203 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →