Last Modified: Dec. 1, 2022
Apache Fineract allowed an authenticated user to perform remote code execution due to a path traversal vulnerability in a file upload component of Apache Fineract, allowing an attacker to run remote code. This issue affects Apache Fineract version 1.8.0 and prior versions. We recommend users to upgrade to 1.8.1.
Tweets last week: 0
Remaining steady
Yahoo results: 322000000
Remaining steady
Current EPSS Score: 0.22009
Remaining steady
Reddit Posts: 1
Remaining steady
Github Repos: 1
Remaining steady
Found exploits:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: Low
User Interaction: None
Scope: Unchanged
Confidentiality: High
Integrity: High
Availability: High
Base Score: 8.8
Exploitability Score:
2.8
Impact Score: 5.9
CVSS V3: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-22
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:a:apache:fineract:*:*:*:*:*:*:*:* Part: a Vendor: apache | Alle Schwachstellen für apache |
Reference:
added:
http://www.openwall.com/lists/oss-security/2022/11/29/3
Base Score V3:
Not defined
Exploitability Score V3:
Not defined
Impact Score V3:
Not defined
Cvss Vector V3:
Not defined
Configuration:
added:
cpe:2.3:a:apache:fineract:*:*:*:*:*:*:*:*
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:apache:fineract:*:*:*:*:*:*:*:*"/> </set> </set>
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:apache:fineract:*:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> </set>