[ 
https://issues.apache.org/jira/browse/FINERACT-2024?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ed Cable deleted FINERACT-2024:
-------------------------------


> Error- based SQL Injection vulnerabilities in 3 endpoints
> ---------------------------------------------------------
>
>                 Key: FINERACT-2024
>                 URL: https://issues.apache.org/jira/browse/FINERACT-2024
>             Project: Apache Fineract
>          Issue Type: Bug
>            Reporter: Mihaly Dallos
>            Assignee: Mihaly Dallos
>            Priority: Blocker
>
> *SQL Injection at /fineract-provider/api/v1/loans*
> The sqlSearch parameter appears to be vulnerable to SQL injection attacks. 
> The payload ' was submitted in the sqlSearch parameter, and a database error 
> message was returned.
> *SQL Injection at /fineract-provider/api/v1/datatables/cdvfbn*
> The URL path filename appears to be vulnerable to SQL injection attack. A 
> single quote was submitted in the URL path filename, and a database error 
> message was returned. Two single quotes were then submitted and the error 
> message disappeared. 
> *SQL Injection at /fineract-provider/api/v1/datatables/dfgh*
> The URL path filename appears to be vulnerable to SQL injection attacks. (276 
> kB)
> https://festive-quiet-137.notion.site/SQL-Injection-at-fineract-provider-api-v1-datatables-dfgh-6c6649a66b2446999e74a060db0a4c32
> *SQL Injection at /fineract-provider/api/v1/clients*
> The sqlSearch parameter appears to be vulnerable to SQL injection attacks. 
> The payload ' was submitted in the sqlSearch parameter, and a database error 
> message was returned. 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to