Apache Fineract allowed an authenticated user to perform remote code execution due to a path traversal vulnerability in a file upload component of Apache Fineract, allowing an attacker to run remote code. This issue affects Apache Fineract version 1.8.0 and prior versions. We recommend users to upgrade to 1.8.1.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2022/11/29/3 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/t8q6fmh3o6yqmy69qtqxppk9yg9wfybg | Mailing List Vendor Advisory |
http://www.openwall.com/lists/oss-security/2022/11/29/3 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/t8q6fmh3o6yqmy69qtqxppk9yg9wfybg | Mailing List Vendor Advisory |
Configurations
History
21 Nov 2024, 07:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2022/11/29/3 - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread/t8q6fmh3o6yqmy69qtqxppk9yg9wfybg - Mailing List, Vendor Advisory |
Information
Published : 2022-11-29 15:15
Updated : 2024-11-21 07:28
NVD link : CVE-2022-44635
Mitre link : CVE-2022-44635
CVE.ORG link : CVE-2022-44635
JSON object : View
Products Affected
apache
- fineract
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')