Skip to content

SQLi in ChurchCRM <= 5.8.0

High
DAcodedBEAT published GHSA-2rh6-gr3h-83j9 Jul 26, 2024

Package

No package listed

Affected versions

<= 5.8.0

Patched versions

>= 5.9.3

Description

Summary

The application is vulnerable to an authenticated SQL injection due to an improper sanitization of user input.

Details

Authentication is required, but no elevated privileges are necessary. This allows attackers to inject SQL statements directly into the database query due to inadequate sanitization of the EID parameter in in a GET request to /GetText.php.

PoC

A simple cURL request demonstrates the vulnerability:

curl "<url>/GetText.php?EID=1%20AND%20IF(1=1,SLEEP(5),0)" -H "Cookie: <your_cookie>"

Impact

The vulnerability is an authenticated blind SQL injection. This vulnerability impacts users of the churchcrm application who have access to the vulnerable endpoint. An attacker could exploit this issue to manipulate the database, potentially extracting sensitive information or performing unauthorized actions

Severity

High

CVE ID

CVE-2024-39304

Weaknesses

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Learn more on MITRE.

Credits