CVE-2024-32838

SQL Injection vulnerability in various API endpoints - offices, dashboards, etc. Apache Fineract versions 1.9 and before have a vulnerability that allows an authenticated attacker to inject malicious data into some of the REST API endpoints' query parameter.  Users are recommended to upgrade to version 1.10.1, which fixes this issue. A SQL Validator has been implemented which allows us to configure a series of tests and checks against our SQL queries that will allow us to validate and protect against nearly all potential SQL injection attacks.
References
Link Resource
https://lists.apache.org/thread/7l88h17pn9nf8zpx5bbojk7ko5oxo1dy Vendor Advisory Mailing List
http://www.openwall.com/lists/oss-security/2025/02/12/1 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:fineract:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-02-12 10:15

Updated : 2025-03-04 17:05


NVD link : CVE-2024-32838

Mitre link : CVE-2024-32838

CVE.ORG link : CVE-2024-32838


JSON object : View

Products Affected

apache

  • fineract
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')