Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 19 Apr 2018 14:30:56 -0700
From: Ed Cable <>
To:, Dev <>, 
	security <>,, 
	圆珠笔 <>
Subject: [SECURITY] CVE-2018-1290: Apache Fineract SQL Injection Vulnerability
 - Single quotation escape caused by two continuous SQL parameters

Severity: Critical

The Apache Software Foundation

Versions Affected:
Apache Fineract 1.0.0
Apache Fineract 0.6.0-incubating
Apache Fineract 0.5.0-incubating
Apache Fineract 0.4.0-incubating


Using a single quotation escape with two continuous SQL parameters can
cause a SQL injection. This could be done in Methods like
retrieveAuditEntries of AuditsApiResource Class
retrieveCommands of MakercheckersApiResource Class

This issue was discovered by 圆珠笔 (


Apache Fineract Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ