Skip to content

SQLi in ChurchCRM <= 5.8.0

High
DAcodedBEAT published GHSA-2rh6-gr3h-83j9 Jul 26, 2024

Package

No package listed

Affected versions

<= 5.8.0

Patched versions

>= 5.9.3

Description

Summary

The application is vulnerable to an authenticated SQL injection due to an improper sanitization of user input.

Details

Authentication is required, but no elevated privileges are necessary. This allows attackers to inject SQL statements directly into the database query due to inadequate sanitization of the EID parameter in in a GET request to /GetText.php.

PoC

A simple cURL request demonstrates the vulnerability:

curl "<url>/GetText.php?EID=1%20AND%20IF(1=1,SLEEP(5),0)" -H "Cookie: <your_cookie>"

Impact

The vulnerability is an authenticated blind SQL injection. This vulnerability impacts users of the churchcrm application who have access to the vulnerable endpoint. An attacker could exploit this issue to manipulate the database, potentially extracting sensitive information or performing unauthorized actions

Severity

High

CVE ID

CVE-2024-39304

Weaknesses

Credits