-
Notifications
You must be signed in to change notification settings - Fork 1.5k
Closed as not planned
Labels
status: invalidAn issue that we don't feel is validAn issue that we don't feel is valid
Description
CVE-2024-49203 was reported on QueryDSL, involving HQL injection trough a user-specified orderBy clause: querydsl/querydsl#3757
I was wondering if Spring Data JPA was vulnerable through its QueryDSL support.
From what I see in the code, OrderSpecifiers are always built using toOrderSpecifier, which calls buildOrderPropertyPathFrom, that seem to validate that a property exists in the entity being queried.
Lines 177 to 188 in ea0bd8c
/** | |
* Transforms a plain {@link Order} into a QueryDsl specific {@link OrderSpecifier}. | |
* | |
* @param order must not be {@literal null}. | |
*/ | |
@SuppressWarnings({ "rawtypes", "unchecked" }) | |
private OrderSpecifier<?> toOrderSpecifier(Order order) { | |
return new OrderSpecifier( | |
order.isAscending() ? com.querydsl.core.types.Order.ASC : com.querydsl.core.types.Order.DESC, | |
buildOrderPropertyPathFrom(order), toQueryDslNullHandling(order.getNullHandling())); | |
} |
A validation of my analysis from the maintainers of this project would be great :-)
OrangeDog
Metadata
Metadata
Assignees
Labels
status: invalidAn issue that we don't feel is validAn issue that we don't feel is valid