Apache Fineract allowed an authenticated user to perform remote code execution due to a path traversal vulnerability in a file upload component of Apache Fineract, allowing an attacker to run remote code. This issue affects Apache Fineract version 1.8.0 and prior versions. We recommend users to upgrade to 1.8.1.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2022/11/29/3 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/t8q6fmh3o6yqmy69qtqxppk9yg9wfybg | Mailing List Vendor Advisory |
http://www.openwall.com/lists/oss-security/2022/11/29/3 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/t8q6fmh3o6yqmy69qtqxppk9yg9wfybg | Mailing List Vendor Advisory |
Configurations
History
25 Apr 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
References | () http://www.openwall.com/lists/oss-security/2022/11/29/3 - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread/t8q6fmh3o6yqmy69qtqxppk9yg9wfybg - Mailing List, Vendor Advisory |
Information
Published : 2022-11-29 15:15
Updated : 2025-04-25 15:15
NVD link : CVE-2022-44635
Mitre link : CVE-2022-44635
JSON object : View
Products Affected
apache
- fineract
CWE
No CWE.