CVE-2022-44635
- EPSS 40.96%
- Veröffentlicht 29.11.2022 15:15:10
- Zuletzt bearbeitet 25.04.2025 15:15:33
Apache Fineract allowed an authenticated user to perform remote code execution due to a path traversal vulnerability in a file upload component of Apache Fineract, allowing an attacker to run remote code. This issue affects Apache Fineract version 1....
CVE-2020-17514
- EPSS 0.81%
- Veröffentlicht 27.05.2021 12:15:07
- Zuletzt bearbeitet 21.11.2024 05:08:15
Apache Fineract prior to 1.5.0 disables HTTPS hostname verification in ProcessorHelper in the configureClient method. Under typical deployments, a man in the middle attack could be successful.
CVE-2018-20243
- EPSS 0.68%
- Veröffentlicht 13.10.2020 19:15:12
- Zuletzt bearbeitet 21.11.2024 04:01:09
The implementation of POST with the username and password in the URL parameters exposed the credentials. More infomration is available in fineract jira issues 726 and 629.
CVE-2018-11801
- EPSS 3.32%
- Veröffentlicht 11.06.2019 17:29:00
- Zuletzt bearbeitet 21.11.2024 03:44:03
SQL injection vulnerability in Apache Fineract before 1.3.0 allows attackers to execute arbitrary SQL commands via a query on a m_center data related table.
CVE-2018-11800
- EPSS 3.32%
- Veröffentlicht 11.06.2019 17:29:00
- Zuletzt bearbeitet 21.11.2024 03:44:03
SQL injection vulnerability in Apache Fineract before 1.3.0 allows attackers to execute arbitrary SQL commands via a query on the GroupSummaryCounts related table.
CVE-2018-1292
- EPSS 0.57%
- Veröffentlicht 20.04.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 03:59:33
Within the 'getReportType' method in Apache Fineract 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, a hacker could inject SQL to read/update data for which he doesn't have authorization for by way of the 'reportName' parameter.
CVE-2018-1291
- EPSS 0.25%
- Veröffentlicht 20.04.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 03:59:33
Apache Fineract 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating exposes different REST end points to query domain specific entities with a Query Parameter 'orderBy' which are appended directly with SQL statements. A hacker/user can inject...
CVE-2018-1290
- EPSS 0.59%
- Veröffentlicht 20.04.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 03:59:33
In Apache Fineract versions 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, Using a single quotation escape with two continuous SQL parameters can cause a SQL injection. This could be done in Methods like retrieveAuditEntries of AuditsAp...
CVE-2018-1289
- EPSS 0.53%
- Veröffentlicht 20.04.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 03:59:33
In Apache Fineract versions 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, the system exposes different REST end points to query domain specific entities with a Query Parameter 'orderBy' and 'sortOrder' which are appended directly with ...
CVE-2017-5663
- EPSS 0.19%
- Veröffentlicht 14.12.2017 15:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
In Apache Fineract 0.4.0-incubating, 0.5.0-incubating, and 0.6.0-incubating, an authenticated user with client/loan/center/staff/group read permissions is able to inject malicious SQL into SELECT queries. The 'sqlSearch' parameter on a number of endp...