Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAOSe2yu-zjb+4Rt0t9tTTwpYAee9qCMenVOsauWJn7=yNQVL=g@mail.gmail.com>
Date: Wed, 13 Dec 2017 15:04:22 +0530
From: Nazeer Shaik <nazeer1100126@...che.org>
To: user@...eract.apache.org, Dev <dev@...eract.apache.org>, 
	oss-security@...ts.openwall.com, security <security@...che.org>, 
	aleksandar.ivanov-2@...dent.manchester.ac.uk
Subject: [SECURITY] CVE-2017-5663: Apache Fineract SQL Injection Vulnerability

CVE-2017-5663: Apache Fineract SQL Injection Vulnerability

Severity: Critical

Vendor:
The Apache Software Foundation

Versions Affected:
Apache Fineract 0.6.0-incubating
Apache Fineract 0.5.0-incubating
Apache Fineract 0.4.0-incubating

Description:
Apache Fineract exposes different REST end points to query domain specific
entities with a Query Parameter 'sqlSearch' which
is appended directly with SQL statements. A hacker/user can inject/draft
the 'sqlSearch' query parameter in such a way to
to read/update the data for which he doesn't have authorization.

Mitigation:
All users should migrate to Apache Fineract 1.0.0 version
https://github.com/apache/fineract/tree/1.0.0


Example:
A request to retrieve the Clients with displayName=Thomas GET
https://DomainName/api/v1/clients?sqlSearch=displayName='Thomas'
An attacker/user can use GET https://DomainName/api/v1/clients?sqlSearch=
or (1==1) to retrieve all clients in the system

Credit:
This issue was discovered by Alex Ivanov

References:
http://fineract.apache.org/
https://cwiki.apache.org/confluence/display/FINERACT/Apache+Fineract+Security+Report

Regards,
Apache Fineract Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.