First published: Tue Oct 13 2020(Updated: )
The implementation of POST with the username and password in the URL parameters exposed the credentials. More infomration is available in fineract jira issues 726 and 629.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Fineract | >=1.0.0<=1.3.0 | |
Apache Fineract | =0.4.0-incubating | |
Apache Fineract | =0.5.0-incubating | |
Apache Fineract | =0.6.0-incubating |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-20243 is high.
Apache Fineract versions 1.0.0 to 1.3.0, 0.4.0-incubating, 0.5.0-incubating, and 0.6.0-incubating are affected by CVE-2018-20243.
The vulnerability CVE-2018-20243 is exploited by implementing POST with the username and password in the URL parameters, which exposes the credentials.
Yes, you can find references for CVE-2018-20243 at: [link](https://lists.apache.org/thread.html/r040d46835aff3c192656b549ca82f62d87fb044ef9a9dd49408b49b4%40%3Cdev.fineract.apache.org%3E)
The CWE-ID of CVE-2018-20243 is 522.