ChurchCRM is an open-source church management system. Versions of the application prior to 5.9.2 are vulnerable to an authenticated SQL injection due to an improper sanitization of user input. Authentication is required, but no elevated privileges are necessary. This allows attackers to inject SQL statements directly into the database query due to inadequate sanitization of the EID parameter in in a GET request to `/GetText.php`. Version 5.9.2 patches the issue.
References
Link | Resource |
---|---|
https://github.com/ChurchCRM/CRM/commit/e3bd7bfbf33f01148df0ef1acdb0cf2c2b878b08 | Patch |
https://github.com/ChurchCRM/CRM/security/advisories/GHSA-2rh6-gr3h-83j9 | Exploit Third Party Advisory |
https://github.com/ChurchCRM/CRM/commit/e3bd7bfbf33f01148df0ef1acdb0cf2c2b878b08 | Patch |
https://github.com/ChurchCRM/CRM/security/advisories/GHSA-2rh6-gr3h-83j9 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 09:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ChurchCRM/CRM/commit/e3bd7bfbf33f01148df0ef1acdb0cf2c2b878b08 - Patch | |
References | () https://github.com/ChurchCRM/CRM/security/advisories/GHSA-2rh6-gr3h-83j9 - Exploit, Third Party Advisory |
19 Sep 2024, 20:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ChurchCRM/CRM/commit/e3bd7bfbf33f01148df0ef1acdb0cf2c2b878b08 - Patch | |
References | () https://github.com/ChurchCRM/CRM/security/advisories/GHSA-2rh6-gr3h-83j9 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:* | |
First Time |
Churchcrm
Churchcrm churchcrm |
29 Jul 2024, 14:12
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
26 Jul 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-26 18:15
Updated : 2024-11-21 09:27
NVD link : CVE-2024-39304
Mitre link : CVE-2024-39304
CVE.ORG link : CVE-2024-39304
JSON object : View
Products Affected
churchcrm
- churchcrm
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')