CVE-2018-20243

The implementation of POST with the username and password in the URL parameters exposed the credentials. More infomration is available in fineract jira issues 726 and 629.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:fineract:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:fineract:0.4.0:incubating:*:*:*:*:*:*
cpe:2.3:a:apache:fineract:0.5.0:incubating:*:*:*:*:*:*
cpe:2.3:a:apache:fineract:0.6.0:incubating:*:*:*:*:*:*

History

21 Nov 2024, 04:01

Type Values Removed Values Added
References () https://lists.apache.org/thread.html/r040d46835aff3c192656b549ca82f62d87fb044ef9a9dd49408b49b4%40%3Cdev.fineract.apache.org%3E - Exploit, Mailing List, Patch, Third Party Advisory () https://lists.apache.org/thread.html/r040d46835aff3c192656b549ca82f62d87fb044ef9a9dd49408b49b4%40%3Cdev.fineract.apache.org%3E - Exploit, Mailing List, Patch, Third Party Advisory

Information

Published : 2020-10-13 19:15

Updated : 2024-11-21 04:01


NVD link : CVE-2018-20243

Mitre link : CVE-2018-20243

CVE.ORG link : CVE-2018-20243


JSON object : View

Products Affected

apache

  • fineract
CWE
CWE-522

Insufficiently Protected Credentials