Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 13 Dec 2017 15:04:22 +0530
From: Nazeer Shaik <>
To:, Dev <>,, security <>,
Subject: [SECURITY] CVE-2017-5663: Apache Fineract SQL Injection Vulnerability

CVE-2017-5663: Apache Fineract SQL Injection Vulnerability

Severity: Critical

The Apache Software Foundation

Versions Affected:
Apache Fineract 0.6.0-incubating
Apache Fineract 0.5.0-incubating
Apache Fineract 0.4.0-incubating

Apache Fineract exposes different REST end points to query domain specific
entities with a Query Parameter 'sqlSearch' which
is appended directly with SQL statements. A hacker/user can inject/draft
the 'sqlSearch' query parameter in such a way to
to read/update the data for which he doesn't have authorization.

All users should migrate to Apache Fineract 1.0.0 version

A request to retrieve the Clients with displayName=Thomas GET
An attacker/user can use GET https://DomainName/api/v1/clients?sqlSearch=
or (1==1) to retrieve all clients in the system

This issue was discovered by Alex Ivanov


Apache Fineract Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ