Lucene search

K
f5F5F5:K21536299
HistoryJul 17, 2018 - 12:00 a.m.

K21536299 : Apache Fineract vulnerabilities CVE-2018-1289, CVE-2018-1290, and CVE-2018-1292

2018-07-1700:00:00
my.f5.com
13

8.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

36.5%

Security Advisory Description

In Apache Fineract versions 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, the system exposes different REST end points to query domain specific entities with a Query Parameter ‘orderBy’ and ‘sortOrder’ which are appended directly with SQL statements. A hacker/user can inject/draft the ‘orderBy’ and ‘sortOrder’ query parameter in such a way to read/update the data for which he doesn’t have authorization.

In Apache Fineract versions 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, Using a single quotation escape with two continuous SQL parameters can cause a SQL injection. This could be done in Methods like retrieveAuditEntries of AuditsApiResource Class and retrieveCommands of MakercheckersApiResource Class.

Within the ‘getReportType’ method in Apache Fineract 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, a hacker could inject SQL to read/update data for which he doesn’t have authorization for by way of the ‘reportName’ parameter.

Impact

There is no impact; F5 products are not affected by this vulnerability.

8.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

36.5%

Related for F5:K21536299