-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Possible HQL injection trough orderBy in QueryDSL #3693
Comments
Generally, asking for exploitability in a publicly visible ticket puts us, our users, and folks looking for zero-day vulnerabilities in a problematic situation. Even worse that there is no fix available for the Querydsl CVE. Not reacting timely to a ticket can be seen as a sign of vulnerability since there's no insight into what happens behind the scenes. A public ticket talking about attack vectors easily leads to concerns on the user side and gives potential attackers some guidance on how things could be exploited. In case of an existing vulnerability, confirming it publicly would prevent us from analyzing the issue, developing and testing a fix propertly, and finally shipping a release. As you might have noticed, discussing security concerns publicly isn't a great approach unless we can guarantee no vulnerability. If you have questions or concerns in the future, I'm asking you to follow our responsible disclosure process outlined in our Security Policy. That being said, your analysis only covers a part of applying sorting to Querydsl queries. For Querydsl sorting, we utilize two approaches:
The |
Sorry about this, I'll be more careful next time! |
|
Hello, I have patched the issue in both the 6.x and 5.x releases of my fork. For anyone concerned about this security issue, the fix is available in my fork. To migrate, simply change the group ID from com.querydsl to io.github.openfeign.querydsl. The fork is fully backward-compatible, so the migration should be seamless. https://github.com/OpenFeign/querydsl/releases/tag/6.10.1 |
@OrangeDog the discussion seems to quote plenty of comments that have been deleted.... Wondering why |
CVE-2024-49203 was reported on QueryDSL, involving HQL injection trough a user-specified orderBy clause: querydsl/querydsl#3757
I was wondering if Spring Data JPA was vulnerable through its QueryDSL support.
From what I see in the code, OrderSpecifiers are always built using toOrderSpecifier, which calls buildOrderPropertyPathFrom, that seem to validate that a property exists in the entity being queried.
spring-data-jpa/spring-data-jpa/src/main/java/org/springframework/data/jpa/repository/support/Querydsl.java
Lines 177 to 188 in ea0bd8c
A validation of my analysis from the maintainers of this project would be great :-)
The text was updated successfully, but these errors were encountered: