8.8
CVSSv3

CVE-2021-43258

Published: 23/11/2022 Updated: 30/11/2022
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

CartView.php in ChurchInfo 1.3.0 allows malicious users to achieve remote code execution through insecure uploads. This requires authenticated access tot he ChurchInfo application. Once authenticated, a user can add names to their cart, and compose an email. Uploading an attachment for the email stores the attachment on the site in the /tmp_attach/ folder where it can be accessed with a GET request. There are no limitations on files that can be attached, allowing for malicious PHP code to be uploaded and interpreted by the server.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

churchdb churchinfo

Github Repositories

ChurchInfo 1.2.13-1.3.0 Remote Code Execution Exploit

CVE-2021-43258 ChurchInfo 1213-130 Remote Code Execution Exploit Full title ChurchInfo 1213-130 Remote Code Execution Exploit Date add 21-11-2022 Category remote exploits Platform php Risk [Security RiskCritical] Description This Metasploit module exploits the logic in the CartViewphp page when crafting a draft email with an attachment By uploading an a