You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@fineract.apache.org by Ed Cable <ed...@mifos.org> on 2018/04/19 21:31:14 UTC
[SECURITY] CVE-2018-1292: Apache Fineract SQL Injection Vulnerability
- Injection via reportName parameter
Severity: Critical
Vendor:
The Apache Software Foundation
Versions Affected:
Apache Fineract 1.0.0
Apache Fineract 0.6.0-incubating
Apache Fineract 0.5.0-incubating
Apache Fineract 0.4.0-incubating
Description:
Within the 'getReportType' method, a hacker could inject SQL to read/update
data for which he doesn't have authorization for by way of the 'reportName'
parameter. Apache Fineract exposes different REST end points to query
domain specific
entities with a Query Parameter 'orderBy' which
are appended directly with SQL statements. A hacker/user can inject/draft
the 'orderBy' query parameter by way of the "order" param in such a way
to
to read/update the data for which he doesn't have authorization.
Mitigation:
All users should migrate to Apache Fineract 1.1.0 version
https://github.com/apache/fineract/tree/1.1.0
Credit:
This issue was discovered by 圆珠笔 (627963028@qq.com)
References:
http://fineract.apache.org/
https://cwiki.apache.org/confluence/display/FINERACT/Apache+
Fineract+Security+Report
Regards,
Apache Fineract Team