Apache

Fineract

20 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 40.96%
  • Veröffentlicht 29.11.2022 15:15:10
  • Zuletzt bearbeitet 25.04.2025 15:15:33

Apache Fineract allowed an authenticated user to perform remote code execution due to a path traversal vulnerability in a file upload component of Apache Fineract, allowing an attacker to run remote code. This issue affects Apache Fineract version 1....

  • EPSS 0.81%
  • Veröffentlicht 27.05.2021 12:15:07
  • Zuletzt bearbeitet 21.11.2024 05:08:15

Apache Fineract prior to 1.5.0 disables HTTPS hostname verification in ProcessorHelper in the configureClient method. Under typical deployments, a man in the middle attack could be successful.

Exploit
  • EPSS 0.68%
  • Veröffentlicht 13.10.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 04:01:09

The implementation of POST with the username and password in the URL parameters exposed the credentials. More infomration is available in fineract jira issues 726 and 629.

  • EPSS 3.32%
  • Veröffentlicht 11.06.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:03

SQL injection vulnerability in Apache Fineract before 1.3.0 allows attackers to execute arbitrary SQL commands via a query on a m_center data related table.

  • EPSS 3.32%
  • Veröffentlicht 11.06.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:03

SQL injection vulnerability in Apache Fineract before 1.3.0 allows attackers to execute arbitrary SQL commands via a query on the GroupSummaryCounts related table.

  • EPSS 0.57%
  • Veröffentlicht 20.04.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:33

Within the 'getReportType' method in Apache Fineract 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, a hacker could inject SQL to read/update data for which he doesn't have authorization for by way of the 'reportName' parameter.

  • EPSS 0.25%
  • Veröffentlicht 20.04.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:33

Apache Fineract 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating exposes different REST end points to query domain specific entities with a Query Parameter 'orderBy' which are appended directly with SQL statements. A hacker/user can inject...

  • EPSS 0.59%
  • Veröffentlicht 20.04.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:33

In Apache Fineract versions 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, Using a single quotation escape with two continuous SQL parameters can cause a SQL injection. This could be done in Methods like retrieveAuditEntries of AuditsAp...

  • EPSS 0.53%
  • Veröffentlicht 20.04.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:33

In Apache Fineract versions 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, the system exposes different REST end points to query domain specific entities with a Query Parameter 'orderBy' and 'sortOrder' which are appended directly with ...

  • EPSS 0.19%
  • Veröffentlicht 14.12.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In Apache Fineract 0.4.0-incubating, 0.5.0-incubating, and 0.6.0-incubating, an authenticated user with client/loan/center/staff/group read permissions is able to inject malicious SQL into SELECT queries. The 'sqlSearch' parameter on a number of endp...