cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-23537,https://securityvulnerability.io/vulnerability/CVE-2024-23537,Apache Fineract Improper Privilege Management Vulnerability,"The vulnerability identified in Apache Fineract arises from improper privilege management, allowing unauthorized access to certain functionalities within the software. This issue primarily affects Apache Fineract versions prior to 1.8.5. It is crucial for users of affected versions to upgrade to version 1.9.0, which rectifies this vulnerability and enhances the overall security posture of the system. Maintaining an updated version is essential for safeguarding sensitive information and ensuring compliance with best practices in cybersecurity.",Apache,Apache Fineract,8.8,HIGH,0.0014299999456852674,false,,false,false,false,,,false,false,,2024-03-29T14:38:05.738Z,0 CVE-2024-23538,https://securityvulnerability.io/vulnerability/CVE-2024-23538,Apache Fineract SQL Injection Vulnerability,"A vulnerability exists in Apache Fineract due to improper neutralization of special elements within SQL commands, leading to an SQL Injection risk. This vulnerability could potentially allow malicious users to manipulate database queries, resulting in unauthorized access to sensitive data. Affected versions include any prior to 1.8.5. It is essential for users to upgrade to version 1.8.5 or 1.9.0 to mitigate this risk and ensure the security of their applications.",Apache,Apache Fineract,9.8,CRITICAL,0.009789999574422836,false,,false,false,false,,,false,false,,2024-03-29T14:37:40.374Z,0 CVE-2024-23539,https://securityvulnerability.io/vulnerability/CVE-2024-23539,Apache Fineract SQL Injection Vulnerability,"An SQL Injection vulnerability has been identified in Apache Fineract, allowing attackers to manipulate SQL queries by improperly neutralizing special elements. This vulnerability affects all versions prior to 1.8.5, potentially enabling unauthorized access and data breaches. It is crucial for users to upgrade to versions 1.8.5 or 1.9.0 to resolve this security flaw and enhance their system's integrity.",Apache,Apache Fineract,9.8,CRITICAL,0.009789999574422836,false,,false,false,false,,,false,false,,2024-03-29T14:36:57.919Z,0 CVE-2023-25197,https://securityvulnerability.io/vulnerability/CVE-2023-25197,"apache fineract: SQL injection vulnerability in certain procedure calls ","Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Software Foundation apache fineract. Authorized users may be able to exploit this for limited impact on components.   This issue affects apache fineract: from 1.4 through 1.8.2. ",Apache,Apache Fineract,6.3,MEDIUM,0.004129999782890081,false,,false,false,false,,,false,false,,2023-03-28T12:15:00.000Z,0 CVE-2023-25195,https://securityvulnerability.io/vulnerability/CVE-2023-25195,Apache Fineract: SSRF template type vulnerability in certain authenticated users,"An SSRF vulnerability has been identified in Apache Fineract, which allows authorized users with limited permissions to exploit the server. This compromise can enable the malicious user to access internal resources and potentially leverage the server for unauthorized outbound communication. Affected versions range from 1.4 to 1.8.3, making it essential for users to review their security measures and apply patches as needed.",Apache,Apache Fineract,8.1,HIGH,0.0013599999947473407,false,,false,false,false,,,false,false,,2023-03-28T12:15:00.000Z,0 CVE-2023-25196,https://securityvulnerability.io/vulnerability/CVE-2023-25196,"Apache Fineract: SQL injection vulnerability ","Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Software Foundation Apache Fineract. Authorized users may be able to change or add data in certain components.   This issue affects Apache Fineract: from 1.4 through 1.8.2. ",Apache,Apache Fineract,4.3,MEDIUM,0.003169999923557043,false,,false,false,false,,,false,false,,2023-03-28T12:15:00.000Z,0 CVE-2022-44635,https://securityvulnerability.io/vulnerability/CVE-2022-44635,Apache Fineract allowed an authenticated user to perform remote code execution due to path traversal,"Apache Fineract allowed an authenticated user to perform remote code execution due to a path traversal vulnerability in a file upload component of Apache Fineract, allowing an attacker to run remote code. This issue affects Apache Fineract version 1.8.0 and prior versions. We recommend users to upgrade to 1.8.1.",Apache,Apache Fineract,8.8,HIGH,0.0009699999936856329,false,,false,false,false,,,false,false,,2022-11-29T00:00:00.000Z,0 CVE-2020-17514,https://securityvulnerability.io/vulnerability/CVE-2020-17514,disabled hostname verificiation,"Apache Fineract prior to 1.5.0 disables HTTPS hostname verification in ProcessorHelper in the configureClient method. Under typical deployments, a man in the middle attack could be successful.",Apache,Apache Fineract,7.4,HIGH,0.0005600000149570405,false,,false,false,false,,,false,false,,2021-05-27T12:10:10.000Z,0 CVE-2018-20243,https://securityvulnerability.io/vulnerability/CVE-2018-20243,,The implementation of POST with the username and password in the URL parameters exposed the credentials. More infomration is available in fineract jira issues 726 and 629.,Apache,Apache Fineract,7.5,HIGH,0.004100000020116568,false,,false,false,false,,,false,false,,2020-10-13T18:23:49.000Z,0 CVE-2018-11801,https://securityvulnerability.io/vulnerability/CVE-2018-11801,,SQL injection vulnerability in Apache Fineract before 1.3.0 allows attackers to execute arbitrary SQL commands via a query on a m_center data related table.,Apache,Apache Fineract,9.8,CRITICAL,0.0036200000904500484,false,,false,false,false,,,false,false,,2019-06-11T16:43:28.000Z,0 CVE-2018-11800,https://securityvulnerability.io/vulnerability/CVE-2018-11800,,SQL injection vulnerability in Apache Fineract before 1.3.0 allows attackers to execute arbitrary SQL commands via a query on the GroupSummaryCounts related table.,Apache,Apache Fineract,9.8,CRITICAL,0.0036200000904500484,false,,false,false,false,,,false,false,,2019-06-11T16:42:05.000Z,0 CVE-2018-1289,https://securityvulnerability.io/vulnerability/CVE-2018-1289,,"In Apache Fineract versions 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, the system exposes different REST end points to query domain specific entities with a Query Parameter 'orderBy' and 'sortOrder' which are appended directly with SQL statements. A hacker/user can inject/draft the 'orderBy' and 'sortOrder' query parameter in such a way to read/update the data for which he doesn't have authorization.",Apache,Apache Fineract,8.8,HIGH,0.0011599999852478504,false,,false,false,false,,,false,false,,2018-04-20T18:29:00.000Z,0 CVE-2018-1290,https://securityvulnerability.io/vulnerability/CVE-2018-1290,,"In Apache Fineract versions 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, Using a single quotation escape with two continuous SQL parameters can cause a SQL injection. This could be done in Methods like retrieveAuditEntries of AuditsApiResource Class and retrieveCommands of MakercheckersApiResource Class.",Apache,Apache Fineract,9.8,CRITICAL,0.0012700000079348683,false,,false,false,false,,,false,false,,2018-04-20T18:29:00.000Z,0 CVE-2018-1291,https://securityvulnerability.io/vulnerability/CVE-2018-1291,,"Apache Fineract 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating exposes different REST end points to query domain specific entities with a Query Parameter 'orderBy' which are appended directly with SQL statements. A hacker/user can inject/draft the 'orderBy' query parameter by way of the ""order"" param in such a way to read/update the data for which he doesn't have authorization.",Apache,Apache Fineract,8.1,HIGH,0.0008299999753944576,false,,false,false,false,,,false,false,,2018-04-20T18:29:00.000Z,0 CVE-2018-1292,https://securityvulnerability.io/vulnerability/CVE-2018-1292,,"Within the 'getReportType' method in Apache Fineract 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating, a hacker could inject SQL to read/update data for which he doesn't have authorization for by way of the 'reportName' parameter.",Apache,Apache Fineract,8.1,HIGH,0.0008299999753944576,false,,false,false,false,,,false,false,,2018-04-20T18:29:00.000Z,0 CVE-2017-5663,https://securityvulnerability.io/vulnerability/CVE-2017-5663,,"In Apache Fineract 0.4.0-incubating, 0.5.0-incubating, and 0.6.0-incubating, an authenticated user with client/loan/center/staff/group read permissions is able to inject malicious SQL into SELECT queries. The 'sqlSearch' parameter on a number of endpoints is not sanitized and appended directly to the query.",Apache,Apache Fineract,8.8,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2017-12-14T15:29:00.000Z,0