[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[SECURITY] CVE-2018-1289: Apache Fineract SQL Injection Vulnerability by orderBy and sortOrder parameters

Severity: Critical

The Apache Software Foundation

Versions Affected:
Apache Fineract 1.0.0
Apache Fineract 0.6.0-incubating
Apache Fineract 0.5.0-incubating
Apache Fineract 0.4.0-incubating

Apache Fineract exposes different REST end points to query domain specific
entities with a Query Parameter 'orderBy' and 'sortOrder' which
are appended directly with SQL statements. A hacker/user can inject/draft
the  'orderBy' and 'sortOrder'  query parameter in such a way to
to read/update the data for which he doesn't have authorization.

All users should migrate to Apache Fineract 1.1.0 version

This issue was discovered by 圆珠笔 (627963028@xxxxxx)


Apache Fineract Team

( ! ) Warning: include(msgfooter.php): failed to open stream: No such file or directory in /var/www/git/apache-fineract-developers/msg04154.html on line 101
Call Stack
10.0005363704{main}( ).../msg04154.html:0

( ! ) Warning: include(): Failed opening 'msgfooter.php' for inclusion (include_path='.:/var/www/git') in /var/www/git/apache-fineract-developers/msg04154.html on line 101
Call Stack
10.0005363704{main}( ).../msg04154.html:0