CVE-2024-49203
Java vulnerability analysis and mitigation

Overview

Querydsl 5.1.0 and OpenFeign Querydsl 6.8 contains a SQL/HQL injection vulnerability in the orderBy functionality of JPAQuery. The vulnerability was discovered by CSIRT.SK security analysts and was assigned CVE-2024-49203. This issue is disputed by a Querydsl community member because the product is not intended to defend against a developer who uses untrusted input directly in query construction (NVD, CSIRT).

Technical details

The vulnerability exists due to insufficient input sanitization in the orderBy(OrderSpecifier order) function. When the order variable is generated from user input using PathBuilder.get() method, it allows injection of arbitrary HQL queries. The vulnerability affects multiple components including querydsl-jpa 5.1.0, querydsl-apt 5.1.0, and OpenFeign querydsl 6.8. The issue was fixed in versions 5.6.1 and 6.10.1 (GitHub Advisory, CSIRT).

Impact

The vulnerability can lead to information disclosure through blind SQL injection techniques, allowing attackers to extract data from the database. Additionally, it could potentially result in denial of service attacks (CSIRT).

Mitigation and workarounds

The issue has been fixed in Querydsl versions 5.6.1 and 6.10.1. Users are recommended to upgrade to these patched versions. For those unable to upgrade immediately, it is recommended to implement additional treatment of user input following secure development best practices (OpenFeign Release, OpenFeign Release).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management