Apache Fineract allowed an authenticated user to perform remote code execution due to a path traversal vulnerability in a file upload component of Apache Fineract, allowing an attacker to run remote code. This issue affects Apache Fineract version 1.8.0 and prior versions. We recommend users to upgrade to 1.8.1.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2022/11/29/3 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/t8q6fmh3o6yqmy69qtqxppk9yg9wfybg | Mailing List Vendor Advisory |
Configurations
History
01 Dec 2022, 21:24
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CPE | cpe:2.3:a:apache:fineract:*:*:*:*:*:*:*:* | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2022/11/29/3 - Mailing List, Third Party Advisory | |
References | (MISC) https://lists.apache.org/thread/t8q6fmh3o6yqmy69qtqxppk9yg9wfybg - Mailing List, Vendor Advisory |
29 Nov 2022, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-29 15:15
Updated : 2024-02-04 23:14
NVD link : CVE-2022-44635
Mitre link : CVE-2022-44635
CVE.ORG link : CVE-2022-44635
JSON object : View
Products Affected
apache
- fineract
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')