Bug 1693453
Summary: | hibernate: SQL injection when using JPQL LIKE expression against MS-SQL Server | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Laura Pardo <lpardo> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | aboyko, agrimm, aileenc, akoufoud, alazarot, almorale, anstephe, asoldano, atangrin, ataylor, bbaranow, bbuckingham, bcourt, bkearney, bmaxwell, brian.stansberry, btotty, cdewolf, chazlett, csutherl, darran.lofthouse, dbecker, dimitris, dkreling, dosoudil, drieden, etirelli, extras-orphan, fgavrilo, fleite, ganandan, gbadner, ggaughan, gvarsami, gzaronik, hhudgeon, ibek, iweiss, janstey, java-sig-commits, jawilson, jclere, jcoleman, jjoyce, jochrist, jolee, jondruse, jpallich, jperkins, jschatte, jschluet, jshepherd, jstastny, jwon, kbasil, kconner, krathod, kverlaen, kwills, ldimaggi, lef, lgao, lhh, loleary, lpeer, lpetrovi, lzap, mbabacek, mburns, mkolesni, mmccune, mnovotny, msochure, msvehla, myarboro, nwallace, ohadlevy, paradhya, pdrozd, pgier, pjindal, pmackay, ppalaga, pslavice, psotirop, puntogil, rchan, rguimara, rjerrido, rnetuka, rrajasek, rstancel, rsvoboda, rsynek, rwagner, rzhang, sclewis, scohen, sdaley, security-response-team, slinaber, smaestri, smarlow, sokeeffe, spinder, sthorger, tcunning, theute, tkirby, tom.jenkinson, twalsh, vhalbert, vtunka, weli |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in Hibernate, where it improperly escaped wildcards in its implementation of JPQL LIKE expressions when running against an MS-SQL Server. This flaw allows for possible SQL injection, leading to possible information disclosure.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-12-13 05:33:10 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1704532, 1705374, 1708502 | ||
Bug Blocks: | 1693454 |
Description
Laura Pardo
2019-03-27 21:09:35 UTC
Statement: Red Hat OpenStack's OpenDaylight has the provision to use JPQL. However, using OpenDaylight with Microsoft MS-SQL is not a supported configuration. Red Hat Satellite 6 does not support using MS-SQL as a database provider, hence the aforementioned product is not affected by this issue. Acknowledgments: Name: Jens Schauder (pivotal.io), Mark Paluch (pivotal.io) This vulnerability is out of security support scope for the following product: * Red Hat JBoss Fuse Service Works 6 Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details. It is not a vulnerability in Hibernate code for the following reason: * It is the user code that passes the [] or [^] constructs into Hibernate. Which might be completely valid constructs in terms of SQL Server. The actual SQL injection is one of the user code, not Hibernate, as Hibernate has no way to assert what is actually intended by the user code. * See also https://docs.microsoft.com/en-us/sql/relational-databases/security/sql-injection#like-clauses * Further more, the characters are treated as a wildcard by SQL Server, as documented. These characters are not prohibited by other databases. Other databases simply treat them as literal characters. It works as advertised by SQL Server. |