First published: Thu Dec 14 2017(Updated: )
In Apache Fineract 0.4.0-incubating, 0.5.0-incubating, and 0.6.0-incubating, an authenticated user with client/loan/center/staff/group read permissions is able to inject malicious SQL into SELECT queries. The 'sqlSearch' parameter on a number of endpoints is not sanitized and appended directly to the query.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Fineract | =0.4.0-incubating | |
Apache Fineract | =0.5.0-incubating | |
Apache Fineract | =0.6.0-incubating |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5663 is a vulnerability in Apache Fineract versions 0.4.0-incubating, 0.5.0-incubating, and 0.6.0-incubating that allows an authenticated user with certain privileges to inject malicious SQL into SELECT queries.
CVE-2017-5663 has a severity rating of 8.8 (high).
CVE-2017-5663 affects Apache Fineract versions 0.4.0-incubating, 0.5.0-incubating, and 0.6.0-incubating.
An authenticated user with client/loan/center/staff/group read permissions can exploit CVE-2017-5663 by injecting malicious SQL into SELECT queries using the 'sqlSearch' parameter on certain endpoints.
Yes, upgrading to a version of Apache Fineract beyond 0.6.0-incubating will fix CVE-2017-5663.