Description
CartView.php in ChurchInfo 1.3.0 allows attackers to achieve remote code execution through insecure uploads. This requires authenticated access tot he ChurchInfo application. Once authenticated, a user can add names to their cart, and compose an email. Uploading an attachment for the email stores the attachment on the site in the /tmp_attach/ folder where it can be accessed with a GET request. There are no limitations on files that can be attached, allowing for malicious PHP code to be uploaded and interpreted by the server.
Published: 2022-11-23
Score: 8.8 High
EPSS: 78.4% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 28 Apr 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Churchdb Churchinfo
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-04-28T20:20:38.840Z

Reserved: 2021-11-02T00:00:00.000Z

Link: CVE-2021-43258

cve-icon Vulnrichment

Updated: 2024-08-04T03:55:28.389Z

cve-icon NVD

Status : Modified

Published: 2022-11-23T19:15:11.823

Modified: 2025-04-28T21:15:55.753

Link: CVE-2021-43258

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses