Vulnerability Description
Apache Fineract prior to 1.5.0 disables HTTPS hostname verification in ProcessorHelper in the configureClient method. Under typical deployments, a man in the middle attack could be successful.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Fineract | < 1.5.0 |
References
- http://www.openwall.com/lists/oss-security/2021/05/27/2Mailing ListThird Party Advisory
- https://issues.apache.org/jira/browse/FINERACT-1211PatchVendor Advisory
- https://lists.apache.org/thread.html/rc011b25289c8a6e14f8bc6d07e727382a1df3c8cf2
- http://www.openwall.com/lists/oss-security/2021/05/27/2Mailing ListThird Party Advisory
- https://issues.apache.org/jira/browse/FINERACT-1211PatchVendor Advisory
- https://lists.apache.org/thread.html/rc011b25289c8a6e14f8bc6d07e727382a1df3c8cf2
FAQ
What is CVE-2020-17514?
CVE-2020-17514 is a vulnerability with a CVSS score of 7.4 (HIGH). Apache Fineract prior to 1.5.0 disables HTTPS hostname verification in ProcessorHelper in the configureClient method. Under typical deployments, a man in the middle attack could be successful.
How severe is CVE-2020-17514?
CVE-2020-17514 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-17514?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Fineract.