[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: [oss-security] [SECURITY] CVE-2017-5663: Apache Fineract SQL Injection Vulnerability
From: Nazeer Shaik <nazeer1100126 () apache ! org>
Date: 2017-12-13 9:46:22
Message-ID: CAOSe2yu-zjb+4Rt0t9tTTwpYAee9qCMenVOsauWJn7=yNQVL=g () mail ! gmail ! com
[Download RAW message or body]
CVE-2017-5663: Apache Fineract SQL Injection Vulnerability
Severity: Critical
Vendor:
The Apache Software Foundation
Versions Affected:
Apache Fineract 0.6.0-incubating
Apache Fineract 0.5.0-incubating
Apache Fineract 0.4.0-incubating
Description:
Apache Fineract exposes different REST end points to query domain specific
entities with a Query Parameter 'sqlSearch' which
is appended directly with SQL statements. A hacker/user can inject/draft
the 'sqlSearch' query parameter in such a way to
to read/update the data for which he doesn't have authorization.
Mitigation:
All users should migrate to Apache Fineract 1.0.0 version
https://github.com/apache/fineract/tree/1.0.0
Example:
A request to retrieve the Clients with displayName=Thomas GET
https://DomainName/api/v1/clients?sqlSearch=displayName='Thomas'
An attacker/user can use GET https://DomainName/api/v1/clients?sqlSearch=
or (1==1) to retrieve all clients in the system
Credit:
This issue was discovered by Alex Ivanov
References:
http://fineract.apache.org/
https://cwiki.apache.org/confluence/display/FINERACT/Apache+Fineract+Security+Report
Regards,
Apache Fineract Team
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic