Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7wqp-wr74-cqv2

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.1

Описание

Apache Fineract 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating exposes different REST end points to query domain specific entities with a Query Parameter 'orderBy' which are appended directly with SQL statements. A hacker/user can inject/draft the 'orderBy' query parameter by way of the "order" param in such a way to read/update the data for which he doesn't have authorization.

Apache Fineract 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating exposes different REST end points to query domain specific entities with a Query Parameter 'orderBy' which are appended directly with SQL statements. A hacker/user can inject/draft the 'orderBy' query parameter by way of the "order" param in such a way to read/update the data for which he doesn't have authorization.

EPSS

Процентиль: 48%
0.00251
Низкий

8.1 High

CVSS3

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 8.1
nvd
почти 8 лет назад

Apache Fineract 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating exposes different REST end points to query domain specific entities with a Query Parameter 'orderBy' which are appended directly with SQL statements. A hacker/user can inject/draft the 'orderBy' query parameter by way of the "order" param in such a way to read/update the data for which he doesn't have authorization.

EPSS

Процентиль: 48%
0.00251
Низкий

8.1 High

CVSS3

Дефекты

CWE-89