CartView.php in ChurchInfo 1.3.0 allows attackers to achieve remote code execution through insecure uploads. This requires authenticated access tot he ChurchInfo application. Once authenticated, a user can add names to their cart, and compose an email. Uploading an attachment for the email stores the attachment on the site in the /tmp_attach/ folder where it can be accessed with a GET request. There are no limitations on files that can be attached, allowing for malicious PHP code to be uploaded and interpreted by the server.
References
Link | Resource |
---|---|
http://www.churchdb.org/ | Product |
https://github.com/rapid7/metasploit-framework/pull/17257 | Exploit Patch Third Party Advisory |
https://sourceforge.net/projects/churchinfo/files/ | Product |
http://www.churchdb.org/ | Product |
https://github.com/rapid7/metasploit-framework/pull/17257 | Exploit Patch Third Party Advisory |
https://sourceforge.net/projects/churchinfo/files/ | Product |
Configurations
History
21 Nov 2024, 06:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.churchdb.org/ - Product | |
References | () https://github.com/rapid7/metasploit-framework/pull/17257 - Exploit, Patch, Third Party Advisory | |
References | () https://sourceforge.net/projects/churchinfo/files/ - Product |
Information
Published : 2022-11-23 19:15
Updated : 2024-11-21 06:28
NVD link : CVE-2021-43258
Mitre link : CVE-2021-43258
CVE.ORG link : CVE-2021-43258
JSON object : View
Products Affected
churchdb
- churchinfo
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type